Authentication And Ciphering (Security) In GSM Network

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ส.ค. 2024
  • Hello friends, here is the link to my new UDEMY Course on 5G Technologies, Architecture And Protocols
    www.udemy.com/...
    Rgister for my free Udemy course on 3G UMTS Networks Fundamentals here:
    www.udemy.com/...
    This offer is for limited time. Presenter: Dr Moazzam Tiwana
    website: drmoazzam.com
    This lecture explains what are authentication and ciphering procedures in GSM (Global System For Mobiles). Important aspects of the security of GSM network. Authentication is meant to stop the illegal use of the network by unauthorized users. A3 algorithm is used for this purpose. It uses RAND and Ki as its input and generates SRES. Which is then compared with the SRES generated on the network side. If the two match, the authentication is successful. In the second step ciphering or encryption of data between BTS and MS (Mobile Station) starts. Ciphering key Kc is generated using A8 algorithm which uses Ki and RAND as its input. The ciphering key Kc and Frame number is then used by A5 algorithm to encrypt user data in the blocks of 114 bits each.

ความคิดเห็น • 16

  • @techthugs
    @techthugs 6 ปีที่แล้ว +2

    Thank you :)
    so simple,

  • @kareemsharawi4778
    @kareemsharawi4778 7 ปีที่แล้ว

    A very good and simple explanation, thanks a lot.

  • @farhiy
    @farhiy 4 ปีที่แล้ว

    Explained well👌...Thank you.

  • @yogi012
    @yogi012 4 ปีที่แล้ว

    Nicely Explained

  • @sachinfulsunge9977
    @sachinfulsunge9977 2 ปีที่แล้ว

    How does the base station or the network calculate the sres if the authentication key never leaves the sim ?

  • @RohitShawshinobi
    @RohitShawshinobi 6 ปีที่แล้ว

    Hi can you tell me if I want to change the cipher setting from A5/1 to A5/3 due to security reasons then in which device I will found this setting. I know this can be found in BSC nodes but no idea where in BSC nodes. Thanks

  • @akhilkhajiakhilkhaji5532
    @akhilkhajiakhilkhaji5532 5 ปีที่แล้ว

    Good sir

  • @lekhrajtiwari5842
    @lekhrajtiwari5842 7 ปีที่แล้ว

    thank you sir

  • @ahmedalani8712
    @ahmedalani8712 7 ปีที่แล้ว

    thank u dr

  • @rizwanudoy8280
    @rizwanudoy8280 6 ปีที่แล้ว

    Thank you for explaining the idea clearly. You keep saying the "network"? By "Network", which component you are referring to here? Is it Authentication Center (AuC) ? Thanks!

    • @dr.moazzamtiwana4743
      @dr.moazzamtiwana4743  6 ปีที่แล้ว

      By Network, here I mean the VLR as it is the entity that is communicating directly with Mobile, the parameters generated by AuC are then stored in VLR for this purpose.

    • @rizwanudoy8280
      @rizwanudoy8280 6 ปีที่แล้ว

      Thank you Sir. You actually explained this in a later video detailing on this topic. Thanks. Please make some videos on the fundamentals on LTE and WiMAX.

  • @pranaydeshmukh9063
    @pranaydeshmukh9063 6 ปีที่แล้ว

    In A3, if Ki is not sent to the BST, then how does BST is able to produce the same SRES as MS?

    • @techthugs
      @techthugs 6 ปีที่แล้ว +3

      Ki is saved in the sim card(MS) and HLR of the network

  • @KhaledMohamed-is5pl
    @KhaledMohamed-is5pl 5 ปีที่แล้ว +1

    Indians talking in English are very hard for me to understand them :(

  • @talellamouchi8386
    @talellamouchi8386 5 ปีที่แล้ว

    Error !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!