tag:blogger.com,1999:blog-3125086853899898004.post2628117294827787113..comments2023-10-14T03:42:39.660-07:00Comments on The OpenBTS Chronicles: Protocol Bugs in GSM HandsetsDavid A. Burgesshttp://www.blogger.com/profile/14372434100222472756noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-3125086853899898004.post-57658555370709782012011-07-17T15:31:56.932-07:002011-07-17T15:31:56.932-07:00A3 and A8 for authentication and A5 for encryption...A3 and A8 for authentication and A5 for encryption on link layerAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-11668038580396286472011-07-17T15:30:20.247-07:002011-07-17T15:30:20.247-07:00nbknnbknAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-71215721427280352532009-08-30T09:59:59.153-07:002009-08-30T09:59:59.153-07:00Could you tell me what encryption and algorithms G...Could you tell me what encryption and algorithms GSM uses in the U.K. please?<br /><br />Kind regards,<br />Jim.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-51704377113025794602009-06-02T08:41:26.250-07:002009-06-02T08:41:26.250-07:00The GSM protocols pre-date public key encryption. ...The GSM protocols pre-date public key encryption. There is no key exchange. Each subscriber has a permanently-assigned secret key, with one copy in the SIM and one copy in the HLR. The network does not know which key to use until it has identified the subscriber.David A. Burgesshttps://www.blogger.com/profile/14372434100222472756noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-66453226963574999542009-05-31T14:45:53.499-07:002009-05-31T14:45:53.499-07:00Pardon my newbie question: why is it impossible to...Pardon my newbie question: why is it impossible to create an encrypted connection before knowing the identity of the subscriber? Would it make key exchange too complicated?gorgonnoreply@blogger.com