Search the FAQ Archives

3 - A - B - C - D - E - F - G - H - I - J - K - L - M
N - O - P - Q - R - S - T - U - V - W - X - Y - Z
faqs.org - Internet FAQ Archives

GSM Security FAQ Revision 2004/02/11 - Part 1/1


[ Usenet FAQs | Web FAQs | Documents | RFC Index | Sex offenders ]
From: will.spencer@gsmsecurity.com (Will Spencer)
Newsgroups: alt.cellular.gsm,alt.answers,news.answers
Subject: GSM Security FAQ Revision 2004/02/11 - Part 1/1
Followup-To: alt.cellular.gsm
Approved: news-answers-request@MIT.EDU
Reply-To: will.spencer@gsmsecurity.com (FAQ Comments address)
Summary: This posting contains a list of Frequently Asked Questions (and their
answers) about GSM security. It should be read by anyone who wishes
to post to the alt.cellular.gsm newsgroup.

See reader questions & answers on this topic! - Help others by sharing your knowledge
Archive-Name: alt.cellular.gsm/gsm-security-faq
Posting-Frequency: Monthly
Last-Modified: 2004/02/11
Version: 2004/02/11

Welcome to the alt.cellular.gsm GSM Security FAQ: Answers to Frequently Asked 
Questions about GSM Security.

The GSM Security FAQ is on the World Wide Web at 
http://www.gsmsecurity.com/faq.shtml


The contents of the alt.cellular.gsm GSM Security FAQ include:


http://www.gsmsecurity.com/faq.shtml#How-is-encryption-utilized-in-GSM?
How is encryption utilized in GSM?

http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-authentication-in-GSM-networks?
What algorithm is utilized for authentication in GSM networks?

http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-encryption-in-GSM-networks?
What algorithm is utilized for encryption in GSM networks?

http://www.gsmsecurity.com/faq.shtml#What-algorithm-is-utilized-for-key-generation-in-GSM-networks?
What algorithm is utilized for key generation in GSM networks?

http://www.gsmsecurity.com/faq.shtml#What-are-the-components-of-a-GSM-network
What are the components of a GSM network

http://www.gsmsecurity.com/faq.shtml#What-are-Ki,-Kc,-RAND,-and-SRES?
What are Ki, Kc, RAND, and SRES?

http://www.gsmsecurity.com/faq.shtml#How-do-Authentication-and-Key-generation-work-in-a-GSM-network?
How do Authentication and Key generation work in a GSM network?

http://www.gsmsecurity.com/faq.shtml#Have-the-A3-and-A8-algorithms-been-broken?
Have the A3 and A8 algorithms been broken?

http://www.gsmsecurity.com/faq.shtml#Have-the-A5-algorithms-been-broken?
Have the A5 algorithms been broken?

http://www.gsmsecurity.com/faq.shtml#What-are-locking-and-unlocking?
What are locking and unlocking?

http://www.gsmsecurity.com/faq.shtml#What-is-an-IMEI?
What is an IMEI?

http://www.gsmsecurity.com/faq.shtml#How-can-I-find-my-IMEI?
How can I find my IMEI?

http://www.gsmsecurity.com/faq.shtml#What-are-the-PIN-and-PUK?
What are the PIN and PUK?

http://www.gsmsecurity.com/faq.shtml#How-do-I-change-my-PIN-and-PUK?
How do I change my PIN and PUK?

http://www.gsmsecurity.com/faq.shtml#How-do-I-use-CallerID?
How do I use CallerID?

User Contributions:

Comment about this article, ask questions, or add new information about this topic:


[ Usenet FAQs | Web FAQs | Documents | RFC Index ]

Send corrections/additions to the FAQ Maintainer:
will.spencer@gsmsecurity.com (FAQ Comments address)





Last Update March 27 2014 @ 02:11 PM