The present document contains an example set of algorithms which may be used as the GSM authentication and key generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in this document are used – the A3 and A8 functions are operator-specifiable rather than being fully standardised).
Section 3 (normative) introduces the algorithms and describes their input and output parameters. Section 4 (normative) defines the algorithms. Section 5 (informative) describes an alternative algorithm that some operators may prefer.
Section 6 (informative) provides test data.
- Edition:
- 13.0.0
- Published:
- 01/01/2016
- Number of Pages:
- 17
- File Size:
- 1 file , 130 KB
- Note:
- This product is unavailable in Russia, Ukraine, Belarus
Reviews
There are no reviews yet.