From: will.spencer@gsmsecurity.com (Will Spencer)
Newsgroups: alt.cellular.gsm,alt.answers,news.answers Subject: GSM Security FAQ Revision 2004/02/11 - Part 1/1 Followup-To: alt.cellular.gsm Approved: news-answers-request@MIT.EDU Reply-To: will.spencer@gsmsecurity.com (FAQ Comments address) Summary: This posting contains a list of Frequently Asked Questions (and their answers) about GSM security. It should be read by anyone who wishes to post to the alt.cellular.gsm newsgroup. See reader questions & answers on this topic! - Help others by sharing your knowledge Archive-Name: alt.cellular.gsm/gsm-security-faq Posting-Frequency: Monthly Last-Modified: 2004/02/11 Version: 2004/02/11 Welcome to the alt.cellular.gsm GSM Security FAQ: Answers to Frequently Asked Questions about GSM Security. The GSM Security FAQ is on the World Wide Web at http://www.gsmsecurity.com/faq.shtml The contents of the alt.cellular.gsm GSM Security FAQ include: http://www.gsmsecurity.com/faq.shtml#How-is-encryption-utilized-in-GSM? How is encryption utilized in GSM? http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-authentication-in-GSM-networks? What algorithm is utilized for authentication in GSM networks? http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-encryption-in-GSM-networks? What algorithm is utilized for encryption in GSM networks? http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-key-generation-in-GSM-networks? What algorithm is utilized for key generation in GSM networks? http://www.gsmsecurity.com/faq.shtml#What-are-the-components-of-a-GSM-network What are the components of a GSM network http://www.gsmsecurity.com/faq.shtml#What-are-Ki,-Kc,-RAND,-and-SRES? What are Ki, Kc, RAND, and SRES? http://www.gsmsecurity.com/faq.shtml#How-do-Authentication-and-Key-generation-work-in-a-GSM-network? How do Authentication and Key generation work in a GSM network? http://www.gsmsecurity.com/faq.shtml#Have-the-A3-and-A8-algorithms-been-broken? Have the A3 and A8 algorithms been broken? http://www.gsmsecurity.com/faq.shtml#Have-the-A5-algorithms-been-broken? Have the A5 algorithms been broken? http://www.gsmsecurity.com/faq.shtml#What-are-locking-and-unlocking? What are locking and unlocking? http://www.gsmsecurity.com/faq.shtml#What-is-an-IMEI? What is an IMEI? http://www.gsmsecurity.com/faq.shtml#How-can-I-find-my-IMEI? How can I find my IMEI? http://www.gsmsecurity.com/faq.shtml#What-are-the-PIN-and-PUK? What are the PIN and PUK? http://www.gsmsecurity.com/faq.shtml#How-do-I-change-my-PIN-and-PUK? How do I change my PIN and PUK? http://www.gsmsecurity.com/faq.shtml#How-do-I-use-CallerID? How do I use CallerID? User Contributions:
[ Usenet FAQs | Web FAQs | Documents | RFC Index ]
Send corrections/additions to the FAQ Maintainer: will.spencer@gsmsecurity.com (FAQ Comments address)
Last Update March 27 2014 @ 02:11 PM
|
Comment about this article, ask questions, or add new information about this topic: