[Comp.Sci.Dept, Utrecht] Note from archiver<at>cs.uu.nl: This page is part of a big collection of Usenet postings, archived here for your convenience. For matters concerning the content of this page, please contact its author(s); use the source, if all else fails. For matters concerning the archive as a whole, please refer to the archive description or contact the archiver.

Subject: GSM Security FAQ Revision 2004/02/11 - Part 1/1

This article was archived around: NNTP-Posting-Wed, 11 Feb 2004 16:19:02 GMT

All FAQs in Directory: alt.cellular.gsm
All FAQs posted in: alt.cellular.gsm
Source: Usenet Version

From: will.spencer@gsmsecurity.com (Will Spencer) Newsgroups: alt.cellular.gsm,alt.answers,news.answers Subject: GSM Security FAQ Revision 2004/02/11 - Part 1/1 Followup-To: alt.cellular.gsm Approved: news-answers-request@MIT.EDU Reply-To: will.spencer@gsmsecurity.com (FAQ Comments address) Summary: This posting contains a list of Frequently Asked Questions (and their answers) about GSM security. It should be read by anyone who wishes to post to the alt.cellular.gsm newsgroup.
Archive-Name: alt.cellular.gsm/gsm-security-faq Posting-Frequency: Monthly Last-Modified: 2004/02/11 Version: 2004/02/11 Welcome to the alt.cellular.gsm GSM Security FAQ: Answers to Frequently Asked Questions about GSM Security. The GSM Security FAQ is on the World Wide Web at http://www.gsmsecurity.com/faq.shtml The contents of the alt.cellular.gsm GSM Security FAQ include: http://www.gsmsecurity.com/faq.shtml#How-is-encryption-utilized-in-GSM? How is encryption utilized in GSM? http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-authentication-in-GSM-networks? What algorithm is utilized for authentication in GSM networks? http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-encryption-in-GSM-networks? What algorithm is utilized for encryption in GSM networks? http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-key-generation-in-GSM-networks? What algorithm is utilized for key generation in GSM networks? http://www.gsmsecurity.com/faq.shtml#What-are-the-components-of-a-GSM-network What are the components of a GSM network http://www.gsmsecurity.com/faq.shtml#What-are-Ki,-Kc,-RAND,-and-SRES? What are Ki, Kc, RAND, and SRES? http://www.gsmsecurity.com/faq.shtml#How-do-Authentication-and-Key-generation-work-in-a-GSM-network? How do Authentication and Key generation work in a GSM network? http://www.gsmsecurity.com/faq.shtml#Have-the-A3-and-A8-algorithms-been-broken? Have the A3 and A8 algorithms been broken? http://www.gsmsecurity.com/faq.shtml#Have-the-A5-algorithms-been-broken? Have the A5 algorithms been broken? http://www.gsmsecurity.com/faq.shtml#What-are-locking-and-unlocking? What are locking and unlocking? http://www.gsmsecurity.com/faq.shtml#What-is-an-IMEI? What is an IMEI? http://www.gsmsecurity.com/faq.shtml#How-can-I-find-my-IMEI? How can I find my IMEI? http://www.gsmsecurity.com/faq.shtml#What-are-the-PIN-and-PUK? What are the PIN and PUK? http://www.gsmsecurity.com/faq.shtml#How-do-I-change-my-PIN-and-PUK? How do I change my PIN and PUK? http://www.gsmsecurity.com/faq.shtml#How-do-I-use-CallerID? How do I use CallerID?