Comments
www.inacon.de/bookstore/books_gsm_a-z.php
Posted by crouse
Its by A5 algorithm
Posted by HamidAliKhan
visit it
network. While the basic authenticated cipher instruction mechanism does not protect against the abuse of WLAN triplets in a. GSM context, it does protect ...
www.3gpp.org/FTP/TSG_SA/WG3_Security/TSGS3_34_Acapulco/Docs/PDF/S3-040574.pdf -
Posted by waqasahmad
Through A5 algorithm
Posted by Hash007
In GSM network a stream cipher algorithm is used known as the A5 algorithm which is used for encryption of the messages and it is initialized with a session key(Kc) and same key is used throughout the call but frame number changes during the call, thus generating a unique key stream for every frame.
The same Session Key (Kc) is used as long as the MSC does not authenticate the Mobile Station again.
Posted by sagitraz
Please follow the links , they would be help ful for you.
1. www.inacon.de/bookstore/books_gsm_a-z.php
2. www.tml.tkk.fi/Opinnot/Tik-110.400/2000/gsm/detailgsm.html
3.www.patentstorm.us/patents/6643513/description.html
Posted by jahangir1983