0% found this document useful (0 votes)
1K views3 pages

Ciphering Procedure in GSM Call Flow

Ciphering is an optional security procedure in GSM that encrypts all information exchanged between the mobile device and network on dedicated radio channels using an encryption key. During the ciphering procedure, the ciphering key is set between the network and mobile device. The network uses CIPHER MODE COMMAND and ENCRYPTION COMMAND messages to initiate ciphering and indicate the encryption information and key to the base station, which then passes this on to the mobile device in a CIPHER MODE COMMAND message. If ciphering is successful, the mobile device returns an encrypted CIPHER MODE COMPLETE message.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views3 pages

Ciphering Procedure in GSM Call Flow

Ciphering is an optional security procedure in GSM that encrypts all information exchanged between the mobile device and network on dedicated radio channels using an encryption key. During the ciphering procedure, the ciphering key is set between the network and mobile device. The network uses CIPHER MODE COMMAND and ENCRYPTION COMMAND messages to initiate ciphering and indicate the encryption information and key to the base station, which then passes this on to the mobile device in a CIPHER MODE COMMAND message. If ciphering is successful, the mobile device returns an encrypted CIPHER MODE COMPLETE message.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Ciphering is one of the security procedures designed to protect the subscriber identity and data. It is an optional procedure in GSM.

When ciphering is active, all information exchanged between the mobile and the network on the dedicated radio channels is encrypted. The key previously set between the network and the MS is used to encipher and to decipher the encrypted information. During the ciphering procedure the ciphering key Kc is set between the network and the MS. Ciphering is initiated after the ciphering key is set on the dedicated signalling channel (SDCCH or FACCH). The GSM uses stream ciphering, which means that the data flow transmitted on the SDCCH/TCH is the binary bit by bit addition of the user data flow to a ciphering bit stream. If ciphering algorithm is changed during Assignment or Handover then BSC passes the cipher mode setting to the MS in Assignment Command or Handover Command message. In an MSC-controlled handover, the MSC tells the new BSS whether encryption is required in the HANDOVER REQUEST message. In a BSC-controlled handover, the BSC passes the encryption information to the target BTS on the activation of the channels if the encryption information was received from the MSC.

CIPHER MODE COMMAND message The MSC sends the CIPHER MODE COMMAND message (a) to the BSC to indicate whether ciphering is required and if so, to indicate the ciphering key. The CIPHER MODE COMMAND message (from the MSC to the BSC) contains the following data:

message type layer 3 header information encryption information: permitted algorithms and ciphering key cipher response mode.

The message contains the encryption instructions and the L3 header information for the MS. When ciphering is required, the encryption information element contains information for the BTS to load the encryption device with the appropriate key. ENCRYPTION COMMAND message On receiving the CIPHER MODE COMMAND message, the BSC selects the algorithm to be used according to the list of permitted algorithms included in the message and the algorithms that are supported by that particular BSS. See Support for different ciphering algorithms for details. Regardless of whether ciphering is to be activated, the BSC stores the encryption information, including the selected algorithm for possible subsequent handovers, and passes the encryption information to the BTS in the ENCRYPTION COMMAND message (b). The ENCRYPTION COMMAND message contains the following data:

message header encryption information: selected algorithm and ciphering key link identifier L3 ciphering mode command to MS message header cipher mode setting: no ciphering/start ciphering cipher response: the cipher response element is used if received from the MSC (optional).

The BTS analyses the ENCRYPTION COMMAND message. If encryption is required, the BTS activates the demodulator to decipher. Regardless of whether ciphering is required, the BTS sends the CIPHER MODE COMMAND message (c) to the MS. CIPHER MODE COMPLETE message The MS starts to decipher and to encipher using its available ciphering key. It then returns to the BTS, in encrypted form, the CIPHER MODE COMPLETE message (d) or the next message it is due to send. The message includes the IMEI, if required by the MSC. On receiving the CIPHER MODE COMPLETE message (or any correctly enciphered layer 2 frame), the BTS starts enciphering and forwards the message via the BSC to the MSC. If the ciphering procedure fails, the MSC takes the appropriate action. Support for different ciphering algorithms The MSC may send a list of permitted ciphering algorithms to the BSC in the CIPHER MODE COMMAND message. The BSC selects the algorithm to be used from this list according to the algorithms that are supported by the BSS. If the BSS supports several algorithms, the BSC makes the selection according to the following preference:

1. A5/3 2. A5/1 3. A5/0 (no ciphering) Algorithms other than the ones mentioned above cannot be used. If the BSS does not support any of the permitted algorithms, the BSC sends the CIPHER MODE REJECT message to the MSC. The MSC then decides on further action.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy