In GSM authentication, there are only two inputs and two outputs of the authenti
ID: 3757578 • Letter: I
Question
In GSM authentication, there are only two inputs and two outputs of the authentication algorithms, where the 3G-UMTS has four inputs and five outputs. Show the inputs and outputs for each one in the following table?
Inputs & outputs
GSM
3G-UMTS
Inputs
Outputs
4%
In 3G-UMTS, there are Two modes of operation of KASUMI algorithm. Mention them and what the purpose of each?
5%
Briefly mention only three enhanced radio access link security features in UMTS over GSM?
Inputs & outputs
GSM
3G-UMTS
Inputs
Outputs
Explanation / Answer
In the Algorithm of Aurthentication FOllowing Input and outputs are used
INPUT
k=stored in USIM
AMF = Stored in USIM
SQN= STORED IN USIM
RAND=Randomly generated number to test
output:
AUTN=Authentication key
IK=Integrity key
ck=Integrity key
XRES=expected result
RES=result
b) Two major operation of KASUMI algorithms are
1.Function FL 2. Function Fo
Both function FL and FO divides 32 bit input data to16 bit.
FL is irreversible while Fo is reversible.
In FL it divides in two parts left half is AND with key.then rotate left half y one key and the result is XOR with right half
IN FO it divides in two 16 bit half and passed through three round of feistel network
c) Mutual Authentication
UMTS provide enhanced protection against false station attack. It allows phones to authenticate the network
Network to Network Security
More secure connection between networks than GSM.
Flexible to update
Security update and enhancement can be done anytime as per the requirement
Key Length
UMTS has key length=128 while GSM=64bit
Have a nice Day
Thumbsup please!!!
Input and output GSM 3G-UMTS Inputs 1.RAND 2.Private key 1.K 2. AMF 3. SQN 4. RAND Outputs 1.FIRST 32bit SERS 2.LAST 54 bit 1. AUTN 2.IK 3.CK 4.XRES 5.RESRelated Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.