Friends, how to generate an Encryption Mask (VP Mask)? drolet_55 13-May-2008 12:01:20 AMComments www.multichannel.com/.../191126-Cable_Show_2009_Technologists_Outline_Next_Generation_Services.php Posted by crouse www.sharewareconnection.com/titles/mask.htm Posted by crouse AC uses SSD_B and the CAVE algorithm. Posted by waqqas1 AC (or VLR if SSD is shared) uses SSD_B and the CAVE algorithm. Posted by jzhang Encryption keys (masks) are needed to encrypt the traffic channels, and the encryption keys are generated on a per-call basis. The mobile station generates the keys at the same time that the network generates the keys during the call setup process. Voice Privacy (VP). VP, as its name implies, encrypts the voice signal that goes over the traffic channel between the mobile station and the serving base station. The network generates the keys in the Home Location Register/Authentication Center (HLR/AC) and then provides them to the anchor MSC and the serving base station. The same keys are used for the duration of the call, even if the mobile station is handed off to another MSC. Therefore, if the keys have already been provided to the anchor MSC, and the mobile station moves into the service area of another MSC, the keys must be passed in an inter-exchange handoff in order to enable the new serving MSC to encrypt the voice and/or control signals. Posted by sagitraz |
Posted: 13-May-2008 10:05:18 AM By: sagitraz Encryption keys (masks) are needed to encrypt the traffic channels, and the encryption keys are generated on a per-call basis. The mobile station generates the keys at the same time that the network generates the keys during the call setup process. Voice Privacy (VP). VP, as its name implies, encrypts the voice signal that goes over the traffic channel between the mobile station and the serving base station. The network generates the keys in the Home Location Register/Authentication Center (HLR/AC) and then provides them to the anchor MSC and the serving base station. The same keys are used for the duration of the call, even if the mobile station is handed off to another MSC. Therefore, if the keys have already been provided to the anchor MSC, and the mobile station moves into the service area of another MSC, the keys must be passed in an inter-exchange handoff in order to enable the new serving MSC to encrypt the voice and/or control signals. | |
Posted: 13-May-2008 11:45:11 AM By: jzhang AC (or VLR if SSD is shared) uses SSD_B and the CAVE algorithm. | |
Posted: 30-December-2008 02:59:28 PM By: waqqas1 AC uses SSD_B and the CAVE algorithm. | |
Posted: 07-September-2009 02:23:29 PM By: crouse www.sharewareconnection.com/titles/mask.htm | |
Posted: 07-September-2009 02:30:53 PM By: crouse www.multichannel.com/.../191126-Cable_Show_2009_Technologists_Outline_Next_Generation_Services.php |