UMTS security procedure: authentication and key procedure
khushboos0911
19 views
2 slides
Sep 13, 2024
Slide 1 of 2
1
2
About This Presentation
UMTS security procedure: authentication and key procedure
Size: 41.93 KB
Language: en
Added: Sep 13, 2024
Slides: 2 pages
Slide Content
UMTS Security Procedure
•Based on a layered architecture with 4
domains, each with its own security functions
and protocols.
•These domain work together to provide end-
to-end security.
•Authentication and key agreement
•Integrity protection
•Ciphering
•Encryption algorithm
•F8 & F9 algorithm
Authentication and key
agreement
•UMTS subscriber to UMTS network
–Both the network & the mobile station supports
all the security mechanism of UMTS.
–Authentication & Key agreement is as follows:
•MS & BS to establish a radio resource control
connection(RRC connection).
•During the establishment of the connection the
mobile station sends its security capabilities to the
base station .
•Security features include UMTS integrity &
encryption algorithms supported & possibly GSM
encryption capabilities as well.
•MS sends its temporary identity TMSI current on the
network.
•If the network can’t solve the TMSI, ask the MS to
send it’s permanent identity & the MS responding
to the request with the IMSI.