3 Pillars of GSM security are
- Authentication
- Encryption
- Privacy(confidentiality)
Authentication
The secret authentication key (Ki) is not known to the mobile user and is the property of the service provider, the home system of the mobile station (MS) generates the random number say Rand which is a 126-bit number. This random number is sent to MS.
The MS uses the A3 algorithm to authenticate the user. The algorithm A3 uses Ki and Rand numbers to generate a signed result called s_RES. MS sends s_RES to the home system of MS.
The s_RES generated by MS and the authentication centre are compared. If both s_RES are identical only then the user is valid and access is granted otherwise not.
Encryption
Process Inside sim card:
- we have a random number and a key Ki which is unknown to the user that gets passed as input to the A8 key generation algorithm.
- A8 algorithm generates output known as key Kc.
Process outside sim card:
- A5 ciphering algorithm takes raw voice and data and produces an encrypted voice and data stream output.
Privacy(confidentiality)
To ensure subscriber identity confidentiality, the Temporary Mobile Subscriber Identity (TMSI) is used instead of IMSI.