SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide                                                                                8 Ciphering




                                                                                 8         Ciphering


About This Chapter

                    Ciphering is used to secure the information exchange between an MS and a BTS. The information
                    consists of the signaling information and the subscriber information. The subscriber information
                    consists of the subscriber data and the subscriber voice.

                    8.1 Ciphering Procedure
                    Whether ciphering is used or not is determined by the radio resource management entity. The
                    ciphering procedure is initiated by the network and is performed in the BTS. To cipher the user
                    data, you must enter the corresponding parameters in the ciphering program. The ciphering key
                    Kc is generated by the AUC, is stored in the MSC/VLR, and is sent to the BTS before ciphering.
                    8.2 Ciphering Mode Change
                    The MSC sends a Ciphering Mode Change command, and the BTS performs the ciphering mode
                    change.
                    8.3 Internal BSC Signaling Procedure of Ciphering
                    This topic describes the internal BSC signaling procedure of ciphering.
                    8.4 Abnormal Ciphering Cases
                    This topic describes the abnormal ciphering cases.




Issue 01 (2007-09-05)                             Huawei Technologies Proprietary                               8-1
HUAWEI BSC6000 Base Station Subsystem
8 Ciphering                                                                    Signaling Analysis Guide




8.1 Ciphering Procedure
              Whether ciphering is used or not is determined by the radio resource management entity. The
              ciphering procedure is initiated by the network and is performed in the BTS. To cipher the user
              data, you must enter the corresponding parameters in the ciphering program. The ciphering key
              Kc is generated by the AUC, is stored in the MSC/VLR, and is sent to the BTS before ciphering.

Signaling Procedure
              Figure 8-1 shows the ciphering procedure.

              Figure 8-1 Ciphering procedure

                   MS                     BTS                        BSC                    MSC

                                                                           Ciphering Mode
                                                   Encryption               Command(1)
                         Ciphering Mode         Mode Command(2)
                          Command(3)
                                 SDCCH

                        Ciphering Mode
                         Command(4)
                        SDCCH
                                                                           Ciphering Mode
                                                                            Command(5)




              The ciphering procedure is as follows:
              1.   The MSC sends the BSC a Ciphering Mode Command message. The Ciphering Mode
                   Command message carries the required ciphering algorithms including A5/0, the ciphering
                   key Kc, and whether the Ciphering Mode Complete message sent by the MS must carry
                   the IMEI.
              2.   According to the ciphering algorithm in the Ciphering Mode Command message, the
                   ciphering algorithm allowed by the BSC, and the ciphering algorithm supported by the MS,
                   the BSC determines the algorithm to be used and notifies the BTS.
              3.   The BTS sends the Ciphering Mode Command message to notify the MS of the ciphering
                   algorithm.
              4.   Upon receiving the Ciphering Mode Command message, the MS starts sending the
                   ciphering mode and then responds the BSC with a Cipher Mode Complete message.
              5.   Upon receiving the Ciphering Mode Complete message from the MS, the BSC notifies the
                   MSC of the ciphering completion.

Procedure Description
              For details about the ciphering procedure, refer to the following:
              l    A5 ciphering algorithm
                   As specified in the GSM protocol, there are eight ciphering algorithms, A5/0–A5/7, in
                   which A5/0 indicates Not Ciphered. The ciphering mode setting procedure is initiated by

8-2                       Huawei Technologies Proprietary                               Issue 01 (2007-09-05)
HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide                                                                                 8 Ciphering

                         the network. The required ciphering algorithm is specified in the Ciphering Information
                         element of the Ciphering Mode Command message.
                    l    Ciphering algorithm selection
                         When an MS initiates a call, it sends a CM Service Request message that carries classmark
                         2, classmark 3, and the ciphering algorithm supported by the MS. When the ECSC is set
                         to 1, classmark 3 is carried in the CM Service Request message. When the ECSC is set to
                         0, classmark 3 can only be carried in the CM Service Request message through classmark
                         change or update. Therefore, set the ECSC to 1 when ciphering is used. According to the
                         ciphering algorithm in the Cipher Mode Command message, the ciphering algorithm
                         allowed by the BSC, and the ciphering algorithm in the CM Service Request message, the
                         BSC determines the algorithm to be used. In a reverse order, the BSC selects an applicable
                         algorithm from the intersection of the early-mentioned three algorithms. The priority of the
                         algorithms is A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 > A5/2 > A5/1 > A5/0.
                    l    Ciphering during handover
                         The Handover Request message carries an Ciphering Information element. The Ciphering
                         Information element specifies the required ciphering algorithm and the ciphering key. If
                         one of the two A interfaces of the two BSSs is in PHASE I, because of the defects in the
                         ETSI GSM PHASE I protocol (no ciphering mode setting information unit is included in
                         the Handover Command message), the two BSSs interoperate only when they use the same
                         ciphering algorithm such as A5/0 or A5/2. Otherwise, special processing (modifying the
                         inter-BSC handover command) is required in the target MSC or the target BSC (or the
                         serving MSC or the serving BSC).
                         During the interconnection on the A interface in ciphering mode, to avoid unsuccessful
                         handovers, you must know whether additional data configuration is required on the BSCs
                         and MSCs from different manufacturers.


8.2 Ciphering Mode Change
                    The MSC sends a Ciphering Mode Change command, and the BTS performs the ciphering mode
                    change.

                    The BTS performs and manages ciphering. The BSC does no processing.

                    If the ciphering mode is changed,
                    1.   The BTS performs the sending configuration in old mode and the receiving configuration
                         in new mode.
                    2.   The MS is configured in a completely new mode, including transmission and reception.
                    3.   The BTS is configured in a completely new mode.


8.3 Internal BSC Signaling Procedure of Ciphering
                    This topic describes the internal BSC signaling procedure of ciphering.

                    The internal BSC signaling procedure of ciphering is as follows:
                    1.   Upon receiving the Ciphering Mode Command message from the MSC, the BSC checks
                         the classmarks of the MS and the settings of the Ciphering Algorithm in the Cell
                         Attributes dialog box.


Issue 01 (2007-09-05)                             Huawei Technologies Proprietary                                8-3
HUAWEI BSC6000 Base Station Subsystem
8 Ciphering                                                                     Signaling Analysis Guide

              2.   According to the ciphering algorithm in the Ciphering Mode Command message, the
                   ciphering algorithm allowed by the BSC, and the ciphering algorithm in the CM Service
                   Request message, the BSC determines the algorithm to be used.
              3.   In a reverse order, the BSC selects an applicable algorithm from the intersection of the
                   early-mentioned three algorithms. The priority of the algorithms is A5/7 > A5/6 > A5/5 >
                   A5/4 > A5/4 > A5/3 > A5/2 > A5/1 > A5/0. The determined ciphering mode is carried in
                   the Cipher Mode Command message that is sent to the BTS.


8.4 Abnormal Ciphering Cases
              This topic describes the abnormal ciphering cases.

              8.4.1 BSS Sending a Cipher Mode Reject Message
              This topic describes the fault, probable causes, and handling suggestions.
              8.4.2 MS Doing No Processing
              This topic describes the fault, probable causes, and handling suggestions.

8.4.1 BSS Sending a Cipher Mode Reject Message
              This topic describes the fault, probable causes, and handling suggestions.

Fault
              The BSS sends the MSC a Cipher Mode Reject message.

Probable Causes
              The probable causes are as follows:
              1.   The BSS does not support the ciphering algorithm specified in the Ciphering Mode
                   Command message. It sends the MSC a Cipher Mode Reject message with the cause value
                   Ciphering Algorithm Not Supported.
              2.   If the BSS has initiated ciphering before the MSC requires changing the ciphering
                   algorithm, the BSS sends the MSC a Cipher Mode Reject message.

Handling Suggestions
              l    Check whether the BSS supports the ciphering algorithm specified in the Ciphering Mode
                   Command message.
              l    Check whether the BSS has initiated ciphering.

8.4.2 MS Doing No Processing
              This topic describes the fault, probable causes, and handling suggestions.

Fault
              Upon receiving the Ciphering Mode Command message, the MS does no processing.

Probable Causes
              The Ciphering Mode Command message is considered valid when:

8-4                       Huawei Technologies Proprietary                                  Issue 01 (2007-09-05)
HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide                                                                                 8 Ciphering

                    l    It carries an Algorithm Identifier and is received by the MS in No Ciphering mode.
                    l    It carries No Algorithm Identifier and is received by the MS in No Ciphering mode.
                    l    It carries No Algorithm Identifier and is received by the MS in Ciphering mode.
                    The Ciphering Mode Command message received in other cases, for example, when it carries
                    an Algorithm Identifier and is received in Ciphering mode, is considered erroneous. In this case,
                    the MS sends an RR Status message with the cause value Protocol Error and does no further
                    processing.

Handling Suggestions
                    Check the mode that the MS is in and the Ciphering Mode Command message.




Issue 01 (2007-09-05)                              Huawei Technologies Proprietary                               8-5
01 08 ciphering

Weitere Àhnliche Inhalte

Was ist angesagt?

Core cs overview (1)
Core cs overview (1)Core cs overview (1)
Core cs overview (1)Rashid Khan
 
7.satish kumar 74-81
7.satish kumar 74-817.satish kumar 74-81
7.satish kumar 74-81Alexander Decker
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryaliZaryal Social
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsmvish0110
 
Gsm architecture and signalling techniques
Gsm architecture and signalling techniquesGsm architecture and signalling techniques
Gsm architecture and signalling techniqueskanisthika chauhan
 
10 Slides to SMS
10 Slides to SMS10 Slides to SMS
10 Slides to SMSseanraz
 
Gsm Originating Call Flow
Gsm Originating Call FlowGsm Originating Call Flow
Gsm Originating Call FlowDeepak Sharma
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network LayerYubraj C.
 
Gsm training
Gsm trainingGsm training
Gsm traininggernaz55
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 
System Introduction
System IntroductionSystem Introduction
System IntroductionSokunth Che
 
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesCDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesShameer KC
 
GSM Protocol Stack and Frame Formating
GSM Protocol Stack and Frame FormatingGSM Protocol Stack and Frame Formating
GSM Protocol Stack and Frame FormatingDr. Ramchandra Mangrulkar
 
Gsm air interface
Gsm air interface Gsm air interface
Gsm air interface Rizwan Pasha M
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Networkyusufd
 

Was ist angesagt? (20)

Gsm
GsmGsm
Gsm
 
Core cs overview (1)
Core cs overview (1)Core cs overview (1)
Core cs overview (1)
 
7.satish kumar 74-81
7.satish kumar 74-817.satish kumar 74-81
7.satish kumar 74-81
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryali
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
 
Gsm architecture and signalling techniques
Gsm architecture and signalling techniquesGsm architecture and signalling techniques
Gsm architecture and signalling techniques
 
10 Slides to SMS
10 Slides to SMS10 Slides to SMS
10 Slides to SMS
 
Gsm Originating Call Flow
Gsm Originating Call FlowGsm Originating Call Flow
Gsm Originating Call Flow
 
Gsm protl
Gsm protlGsm protl
Gsm protl
 
GSM - The Network Layer
GSM - The Network LayerGSM - The Network Layer
GSM - The Network Layer
 
Basic of teleom gsm
Basic of teleom gsmBasic of teleom gsm
Basic of teleom gsm
 
Gsm
GsmGsm
Gsm
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
Gsm training
Gsm trainingGsm training
Gsm training
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 
System Introduction
System IntroductionSystem Introduction
System Introduction
 
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging ServicesCDMA Wireless Intelligent Network for Advanced Short Messaging Services
CDMA Wireless Intelligent Network for Advanced Short Messaging Services
 
GSM Protocol Stack and Frame Formating
GSM Protocol Stack and Frame FormatingGSM Protocol Stack and Frame Formating
GSM Protocol Stack and Frame Formating
 
Gsm air interface
Gsm air interface Gsm air interface
Gsm air interface
 
Introduction to Mobile Core Network
Introduction to Mobile Core NetworkIntroduction to Mobile Core Network
Introduction to Mobile Core Network
 

Ähnlich wie 01 08 ciphering

Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...IJMTST Journal
 
Modul 3 gsm procedures
Modul 3   gsm proceduresModul 3   gsm procedures
Modul 3 gsm proceduresWijaya Kusuma
 
MCP2515: Stand-Alone CAN Controller
MCP2515: Stand-Alone CAN ControllerMCP2515: Stand-Alone CAN Controller
MCP2515: Stand-Alone CAN ControllerPremier Farnell
 
Motorola BSC Overview
Motorola BSC OverviewMotorola BSC Overview
Motorola BSC OverviewFarhan Ahmed
 
Location Updating
Location UpdatingLocation Updating
Location UpdatingSokunth Che
 
Detecting hardware virtualization rootkits
Detecting hardware virtualization rootkitsDetecting hardware virtualization rootkits
Detecting hardware virtualization rootkitsEdgar Barbosa
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMcscpconf
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes SHUBHA CHATURVEDI
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM ArchitecturePratik Gupta
 
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...IJERA Editor
 
gsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptgsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptkavitamittal18
 
Mca3050 advanced computer networks
Mca3050  advanced computer networksMca3050  advanced computer networks
Mca3050 advanced computer networkssmumbahelp
 
Mca3050 advanced computer networks
Mca3050  advanced computer networksMca3050  advanced computer networks
Mca3050 advanced computer networkssmumbahelp
 
Encryption
EncryptionEncryption
Encryptionkeith dias
 
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.001 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00Ahmed Gad
 
BICC protocol and application
BICC protocol and applicationBICC protocol and application
BICC protocol and applicationIsybel Harto
 
Can basics
Can basicsCan basics
Can basicscdackp
 
Switching System
Switching SystemSwitching System
Switching SystemSokunth Che
 
Automotive bus technologies
Automotive bus technologiesAutomotive bus technologies
Automotive bus technologiesRadwa Tarek
 

Ähnlich wie 01 08 ciphering (20)

Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
 
Modul 3 gsm procedures
Modul 3   gsm proceduresModul 3   gsm procedures
Modul 3 gsm procedures
 
MCP2515: Stand-Alone CAN Controller
MCP2515: Stand-Alone CAN ControllerMCP2515: Stand-Alone CAN Controller
MCP2515: Stand-Alone CAN Controller
 
Motorola BSC Overview
Motorola BSC OverviewMotorola BSC Overview
Motorola BSC Overview
 
Location Updating
Location UpdatingLocation Updating
Location Updating
 
Detecting hardware virtualization rootkits
Detecting hardware virtualization rootkitsDetecting hardware virtualization rootkits
Detecting hardware virtualization rootkits
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
An On-Chip Bus Tracer Analyzer With Amba AHB For Real Time Tracing With Lossl...
 
gsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptgsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing ppt
 
Mca3050 advanced computer networks
Mca3050  advanced computer networksMca3050  advanced computer networks
Mca3050 advanced computer networks
 
Mca3050 advanced computer networks
Mca3050  advanced computer networksMca3050  advanced computer networks
Mca3050 advanced computer networks
 
Encryption
EncryptionEncryption
Encryption
 
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.001 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
 
BICC protocol and application
BICC protocol and applicationBICC protocol and application
BICC protocol and application
 
Can basics
Can basicsCan basics
Can basics
 
Switching System
Switching SystemSwitching System
Switching System
 
Automotive bus technologies
Automotive bus technologiesAutomotive bus technologies
Automotive bus technologies
 
As35252256
As35252256As35252256
As35252256
 

Mehr von Ericsson Saudi

01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 
01 09 tmsi reallocation
01 09 tmsi reallocation01 09 tmsi reallocation
01 09 tmsi reallocationEricsson Saudi
 
Corporate presentation(041025)
Corporate presentation(041025)Corporate presentation(041025)
Corporate presentation(041025)Ericsson Saudi
 
In network diagram 010210
In network diagram 010210In network diagram 010210
In network diagram 010210Ericsson Saudi
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowEricsson Saudi
 
1 10260 faf10296-en_a_msword2003
1 10260 faf10296-en_a_msword20031 10260 faf10296-en_a_msword2003
1 10260 faf10296-en_a_msword2003Ericsson Saudi
 

Mehr von Ericsson Saudi (6)

01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 
01 09 tmsi reallocation
01 09 tmsi reallocation01 09 tmsi reallocation
01 09 tmsi reallocation
 
Corporate presentation(041025)
Corporate presentation(041025)Corporate presentation(041025)
Corporate presentation(041025)
 
In network diagram 010210
In network diagram 010210In network diagram 010210
In network diagram 010210
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
 
1 10260 faf10296-en_a_msword2003
1 10260 faf10296-en_a_msword20031 10260 faf10296-en_a_msword2003
1 10260 faf10296-en_a_msword2003
 

KĂŒrzlich hochgeladen

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

KĂŒrzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

01 08 ciphering

  • 1. HUAWEI BSC6000 Base Station Subsystem Signaling Analysis Guide 8 Ciphering 8 Ciphering About This Chapter Ciphering is used to secure the information exchange between an MS and a BTS. The information consists of the signaling information and the subscriber information. The subscriber information consists of the subscriber data and the subscriber voice. 8.1 Ciphering Procedure Whether ciphering is used or not is determined by the radio resource management entity. The ciphering procedure is initiated by the network and is performed in the BTS. To cipher the user data, you must enter the corresponding parameters in the ciphering program. The ciphering key Kc is generated by the AUC, is stored in the MSC/VLR, and is sent to the BTS before ciphering. 8.2 Ciphering Mode Change The MSC sends a Ciphering Mode Change command, and the BTS performs the ciphering mode change. 8.3 Internal BSC Signaling Procedure of Ciphering This topic describes the internal BSC signaling procedure of ciphering. 8.4 Abnormal Ciphering Cases This topic describes the abnormal ciphering cases. Issue 01 (2007-09-05) Huawei Technologies Proprietary 8-1
  • 2. HUAWEI BSC6000 Base Station Subsystem 8 Ciphering Signaling Analysis Guide 8.1 Ciphering Procedure Whether ciphering is used or not is determined by the radio resource management entity. The ciphering procedure is initiated by the network and is performed in the BTS. To cipher the user data, you must enter the corresponding parameters in the ciphering program. The ciphering key Kc is generated by the AUC, is stored in the MSC/VLR, and is sent to the BTS before ciphering. Signaling Procedure Figure 8-1 shows the ciphering procedure. Figure 8-1 Ciphering procedure MS BTS BSC MSC Ciphering Mode Encryption Command(1) Ciphering Mode Mode Command(2) Command(3) SDCCH Ciphering Mode Command(4) SDCCH Ciphering Mode Command(5) The ciphering procedure is as follows: 1. The MSC sends the BSC a Ciphering Mode Command message. The Ciphering Mode Command message carries the required ciphering algorithms including A5/0, the ciphering key Kc, and whether the Ciphering Mode Complete message sent by the MS must carry the IMEI. 2. According to the ciphering algorithm in the Ciphering Mode Command message, the ciphering algorithm allowed by the BSC, and the ciphering algorithm supported by the MS, the BSC determines the algorithm to be used and notifies the BTS. 3. The BTS sends the Ciphering Mode Command message to notify the MS of the ciphering algorithm. 4. Upon receiving the Ciphering Mode Command message, the MS starts sending the ciphering mode and then responds the BSC with a Cipher Mode Complete message. 5. Upon receiving the Ciphering Mode Complete message from the MS, the BSC notifies the MSC of the ciphering completion. Procedure Description For details about the ciphering procedure, refer to the following: l A5 ciphering algorithm As specified in the GSM protocol, there are eight ciphering algorithms, A5/0–A5/7, in which A5/0 indicates Not Ciphered. The ciphering mode setting procedure is initiated by 8-2 Huawei Technologies Proprietary Issue 01 (2007-09-05)
  • 3. HUAWEI BSC6000 Base Station Subsystem Signaling Analysis Guide 8 Ciphering the network. The required ciphering algorithm is specified in the Ciphering Information element of the Ciphering Mode Command message. l Ciphering algorithm selection When an MS initiates a call, it sends a CM Service Request message that carries classmark 2, classmark 3, and the ciphering algorithm supported by the MS. When the ECSC is set to 1, classmark 3 is carried in the CM Service Request message. When the ECSC is set to 0, classmark 3 can only be carried in the CM Service Request message through classmark change or update. Therefore, set the ECSC to 1 when ciphering is used. According to the ciphering algorithm in the Cipher Mode Command message, the ciphering algorithm allowed by the BSC, and the ciphering algorithm in the CM Service Request message, the BSC determines the algorithm to be used. In a reverse order, the BSC selects an applicable algorithm from the intersection of the early-mentioned three algorithms. The priority of the algorithms is A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 > A5/2 > A5/1 > A5/0. l Ciphering during handover The Handover Request message carries an Ciphering Information element. The Ciphering Information element specifies the required ciphering algorithm and the ciphering key. If one of the two A interfaces of the two BSSs is in PHASE I, because of the defects in the ETSI GSM PHASE I protocol (no ciphering mode setting information unit is included in the Handover Command message), the two BSSs interoperate only when they use the same ciphering algorithm such as A5/0 or A5/2. Otherwise, special processing (modifying the inter-BSC handover command) is required in the target MSC or the target BSC (or the serving MSC or the serving BSC). During the interconnection on the A interface in ciphering mode, to avoid unsuccessful handovers, you must know whether additional data configuration is required on the BSCs and MSCs from different manufacturers. 8.2 Ciphering Mode Change The MSC sends a Ciphering Mode Change command, and the BTS performs the ciphering mode change. The BTS performs and manages ciphering. The BSC does no processing. If the ciphering mode is changed, 1. The BTS performs the sending configuration in old mode and the receiving configuration in new mode. 2. The MS is configured in a completely new mode, including transmission and reception. 3. The BTS is configured in a completely new mode. 8.3 Internal BSC Signaling Procedure of Ciphering This topic describes the internal BSC signaling procedure of ciphering. The internal BSC signaling procedure of ciphering is as follows: 1. Upon receiving the Ciphering Mode Command message from the MSC, the BSC checks the classmarks of the MS and the settings of the Ciphering Algorithm in the Cell Attributes dialog box. Issue 01 (2007-09-05) Huawei Technologies Proprietary 8-3
  • 4. HUAWEI BSC6000 Base Station Subsystem 8 Ciphering Signaling Analysis Guide 2. According to the ciphering algorithm in the Ciphering Mode Command message, the ciphering algorithm allowed by the BSC, and the ciphering algorithm in the CM Service Request message, the BSC determines the algorithm to be used. 3. In a reverse order, the BSC selects an applicable algorithm from the intersection of the early-mentioned three algorithms. The priority of the algorithms is A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 > A5/2 > A5/1 > A5/0. The determined ciphering mode is carried in the Cipher Mode Command message that is sent to the BTS. 8.4 Abnormal Ciphering Cases This topic describes the abnormal ciphering cases. 8.4.1 BSS Sending a Cipher Mode Reject Message This topic describes the fault, probable causes, and handling suggestions. 8.4.2 MS Doing No Processing This topic describes the fault, probable causes, and handling suggestions. 8.4.1 BSS Sending a Cipher Mode Reject Message This topic describes the fault, probable causes, and handling suggestions. Fault The BSS sends the MSC a Cipher Mode Reject message. Probable Causes The probable causes are as follows: 1. The BSS does not support the ciphering algorithm specified in the Ciphering Mode Command message. It sends the MSC a Cipher Mode Reject message with the cause value Ciphering Algorithm Not Supported. 2. If the BSS has initiated ciphering before the MSC requires changing the ciphering algorithm, the BSS sends the MSC a Cipher Mode Reject message. Handling Suggestions l Check whether the BSS supports the ciphering algorithm specified in the Ciphering Mode Command message. l Check whether the BSS has initiated ciphering. 8.4.2 MS Doing No Processing This topic describes the fault, probable causes, and handling suggestions. Fault Upon receiving the Ciphering Mode Command message, the MS does no processing. Probable Causes The Ciphering Mode Command message is considered valid when: 8-4 Huawei Technologies Proprietary Issue 01 (2007-09-05)
  • 5. HUAWEI BSC6000 Base Station Subsystem Signaling Analysis Guide 8 Ciphering l It carries an Algorithm Identifier and is received by the MS in No Ciphering mode. l It carries No Algorithm Identifier and is received by the MS in No Ciphering mode. l It carries No Algorithm Identifier and is received by the MS in Ciphering mode. The Ciphering Mode Command message received in other cases, for example, when it carries an Algorithm Identifier and is received in Ciphering mode, is considered erroneous. In this case, the MS sends an RR Status message with the cause value Protocol Error and does no further processing. Handling Suggestions Check the mode that the MS is in and the Ciphering Mode Command message. Issue 01 (2007-09-05) Huawei Technologies Proprietary 8-5