PrepAway - Latest Free Exam Questions & Answers

How is authentication implemented in GSM?

How is authentication implemented in GSM?

PrepAway - Latest Free Exam Questions & Answers

A.
Using public key cryptography

B.
It is not implemented in GSM

C.
Using secret key cryptography

D.
Out-of-band verification

Explanation:
Authentication is effected in GSM through the use of a common
secret key, Ks, that is stored in the network operator’s Authentication
Center (AuC) and in the subscriber’s SIM card. The SIM card may be in
the subscriber’s laptop, and the subscriber is not privy to Ks. To begin
the authentication exchange, the home location of the subscriber’s
mobile station, (MS), generates a 128-bit random number (RAND) and
sends it to the MS. Using an algorithm that is known to both the AuC
and MS, the RAND is encrypted by both parties using the secret key,
Ks. The ciphertext generated at the MS is then sent to the AuC and
compared with the ciphertext generated by the Auc. If the two results
match, the MS is authenticated and the access request is granted. If
they do not match, the access request is denied. The other answers are, therefore, incorrect.


Leave a Reply