Authentication, Encryption, and Selection Flashcards

1
Q

That are the “triplets”?

A

The RAND, SRES, and Kc (K sub C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which algorithm is used to calculate the SRES?

A

A3 Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which algorithm is used to calculate the Kc?

A

A8 Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are the Ki codes stored?

A

The SIM and the AUC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Once the AUC has generated the triplets, how is the authentication and encryption completed?

A

Once the AuC has generated the Triplets, they are forwarded to the serving MSC. The MSC forwards the RAND on the downlink to the MS. The MS uses the RAND to create the same Triplets that the network did. The MS then sends the SRES back to the MSC.
If the received SRES matches the SRES generated by the network, the handset is authenticated, and receives a TMSI and a Location Update Accept message (LUA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the A5 algorithm?

A

The A5 algorithm is used to combine the Kc and the user traffic to create a ciphered bit stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is A5/0 level of encryption?

A

A5/0 refers to an unencrypted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is A5/1 level of encryption?

A

A5/1 is a 64-bit cipher that was used by most GSM networks until it was successfully reverse engineered in 1999.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is A5/2 level of encryption?

A

A5/2 is a far weaker encryption scheme than A5/1 and was banned from use on GSM networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is A5/3 level of encryption?

A

A5/3 Is the most common standard found today; a 128-bit cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is A5/4 level of encryption?

A

A5/4 is the most complex encryption scheme but is not fielded by GSM networks at the time of this guide’s writing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which multiple access schemes are used in GSM?

A

FDMA and TDMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is FDMA?

A

In FDMA, users are on separate frequencies.
To increase users, a network must increase the amount of frequency it owns.
The primary multiple access scheme used in 1G technologies.
Very inefficient .
In GSM, each frequency is 200 kHz in bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TDMA?

A

In TDMA, several users use the same frequency, but at different times.
The “timeslots” switch so fast that it is indistinguishable to the human ear.
In GSM there are 8 timeslots per frequency that are 577 microseconds long.
In high density areas, GSM networks can use Half-Rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How long are GSM frames and time slots?

A

One frame is 4.615 milliseconds

One time slot is 577 microseconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is timing advance?

A

Signals transmitted from phones far away from the tower take great times to arrive at the tower.
This can cause the signal to arrive late for its assigned timeslot.
To counter this, phones are associated a “Timing Advance” according to how far they are from the tower.
This causes the phone to send its signal earlier, so it arrives in its proper timeslot.

17
Q

What are the timing advance message ranges?

A

The timing advance message ranges between 0-63. The first timing advance ring is approximately 350 meters, and each subsequent ring is 550 meters.

18
Q

What is duplexing?

A

A Duplex method is the method by which radios distinguish transmission paths.
In GSM, the transmission path from the tower to the MS is called the “Downlink”.
The transmission path from the MS to the tower is called the “Uplink”.
GSM separates the uplink and downlink by using separate frequencies. This is called Frequency Division Duplexing (FDD).
The frequency separation between Downlink and Uplink is called an “offset”.
GSM radios can only listen to one frequency at a time, so it is Half-Duplex, meaning communication goes both ways, non-simultaneously.

19
Q

What is an ARFCN?

A

A GSM channel is called an “Absolute Radio Frequency Channel Number” or ARFCN.
An ARFCN refers to both the uplink and downlink frequencies that make up a radio channel, it is a pair of frequencies.

20
Q

What is idle mode?

A

Once a handset is authenticated and allowed onto a network, it goes into idle mode in which it “camps” on a selected ARFCN.
Camping means that the handset is passively monitoring Paging Channels in case it has incoming traffic and periodically monitoring the BCCH.
A handset will monitor all 32 neighbors on its BA list, however it will monitor the top six neighbors, the Neighbor List, much more frequently.

21
Q

What is reselection?

A

While in idle mode, the mobile handset constantly looks for the best ARFCN. If an ARFCN is stronger than its current serving ARFCN, the handset will “reselect” to that new ARFCN and camp there. Reselection is done by the handset alone and requires no network assistance.
The rules governing reselection are dictated by the “C2” equation.
The handset calculate C2 values for the ARFCNs on its neighbor list and will reselect if a neighbor ARFCN has a higher C2 value for more than five seconds.

22
Q

What is the C2 equation?

A

C2 = C1 + CRO - (Temporary Offset*H)

H is the Penalty Timer rangers from 0-31 (in increments of 20 seconds) that dictates how long the Temporary Offset applies.

23
Q

What is CRO?

A

Cell Reselection Offset (CRO) is an artificial value that ranges from 0-7 (in increments of 10 dB with 7 being infinitely high) that makes an ARFCN appear less attractive than its actual RSSI.

24
Q

What is CRH?

A

Cell Reselection Hysteresis (CRH)
An artificial value applied to the serving cell from 0-14 (in increments of 2db).
Used on LAC boundaries to prevent “ping ponging” from LAC to LAC, causing frequent network traffic

25
Q

What is the T3212 timer?

A

A timer (0-255 in increments of 6 minutes) that causes the handset to register periodically to ensure the handset is still in the LAC.

26
Q

That is the T3122 timer?

A

A timer that sets the minimum time for a device to issue a RACH after an immediate reject message.

27
Q

What is a hand over and what are the two types?

A

A Handover occurs when a call is handed off from one tower to another because a handset is moving.

For handovers between towers controlled by the same BSC (intra-BSC) the BSC handles signaling required.
For handovers between towers controlled by different BSCs (inter-BSC) the serving MSC must coordinate the handover.