[Comp.Sci.Dept, Utrecht] Note from archiver<at>cs.uu.nl: This page is part of a big collection of Usenet postings, archived here for your convenience. For matters concerning the content of this page, please contact its author(s); use the source, if all else fails. For matters concerning the archive as a whole, please refer to the archive description or contact the archiver.

Subject: alt.cellular.gsm.security FAQ Revision 2004/02/10 - Part 1/1

This article was archived around: NNTP-Posting-Wed, 11 Feb 2004 02:13:36 GMT

All FAQs in Directory: alt.cellular.gsm.security
All FAQs posted in: alt.cellular.gsm.security
Source: Usenet Version


From: will.spencer@gsmsecurity.com (Will Spencer) Newsgroups: alt.cellular.gsm.security,alt.answers,news.answers Subject: alt.cellular.gsm.security FAQ Revision 2004/02/10 - Part 1/1 Followup-To: alt.cellular.gsm.security Approved: news-answers-request@MIT.EDU Reply-To: will.spencer@gsmsecurity.com (FAQ Comments address) Summary: This posting contains a list of Frequently Asked Questions (and their answers) about GSM security. It should be read by anyone who wishes to post to the alt.cellular.gsm.security newsgroup.
Archive-Name: alt.cellular.gsm.security/faq Posting-Frequency: Monthly Last-Modified: 2004/02/10 Version: 2004/02/10 Welcome to the alt.cellular.gsm.security FAQ: Answers to Frequently Asked Questions about GSM Security. The GSM Security FAQ is on the World Wide Web at http://www.gsmsecurity.com/faq.shtml The contents of the alt.cellular.gsm.security FAQ include: http://www.gsmsecurity.com/faq.shtml How is encryption utilized in GSM? http://www.gsmsecurity.com/faq.shtml What algorithm is utilized for authentication in GSM networks? http://www.gsmsecurity.com/faq.shtml What algorithm is utilized for encryption in GSM networks? http://www.gsmsecurity.com/faq.shtml What algorithm is utilized for key generation in GSM networks? http://www.gsmsecurity.com/faq.shtml What are the components of a GSM network http://www.gsmsecurity.com/faq.shtml What are Ki, Kc, RAND, and SRES? http://www.gsmsecurity.com/faq.shtml How do Authentication and Key generation work in a GSM network? http://www.gsmsecurity.com/faq.shtml Have the A3 and A8 algorithms been broken? http://www.gsmsecurity.com/faq.shtml Have the A5 algorithms been broken? http://www.gsmsecurity.com/faq.shtml What are locking and unlocking? http://www.gsmsecurity.com/faq.shtml What is an IMEI? http://www.gsmsecurity.com/faq.shtml How can I find my IMEI? http://www.gsmsecurity.com/faq.shtml What are the PIN and PUK? http://www.gsmsecurity.com/faq.shtml How do I change my PIN and PUK? http://www.gsmsecurity.com/faq.shtml How do I use CallerID?