Term
What does AKA authenticate between? |
|
Definition
Network and user User and network
(Mutual authentication) |
|
|
Term
What two keys does AKA establish? |
|
Definition
|
|
Term
What was AKA designed to achieve? |
|
Definition
Maximum compatibility with GSM |
|
|
Term
What protocol is AKA based upon? |
|
Definition
|
|
Term
What are the four AKA pre-requisites? |
|
Definition
AuC and USIM share
AuC has a randon number generator
AuC has scheme to generate fresh sequence numbers
USIM has scheme to verify freshness of sequence numbers |
|
|
Term
What is a key specific to? |
|
Definition
|
|
Term
|
Definition
Random challenge generated by AuC |
|
|
Term
|
Definition
Expected user response computed by AuC |
|
|
Term
|
Definition
|
|
Term
|
Definition
Actual user response computed by USIM |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What is the AK used to do? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Authentication management field |
|
|
Term
|
Definition
Network authentication token |
|
|
Term
What goes in to generate the AUTN? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
You have the AUTN, which consists of the SQN+AK / AMF / MAC as well as the RAND. How do you regenerate the SQN at the 'other end'? |
|
Definition
You generate the AK by putting your RAND and KEY in. You minus the AK from the AK+SQN which gives you the SQN. |
|
|
Term
What do you verify the SQN For? |
|
Definition
That it is in the correct range |
|
|
Term
When a user authentication requests comes from the VLR / SGSN to the mobile station, what two values are sent? |
|
Definition
|
|
Term
What does the mobile station do when it receives the user auth requests (It has the AUTN and RAND) |
|
Definition
Verify the AUTN and compute the RES |
|
|
Term
When a mobile statioc senda a user auth response what does he send with it? |
|
Definition
|
|
Term
What does the mobile station do after the user auth response is sent? |
|
Definition
Compute the cipher and integrity key |
|
|
Term
When the VLR / SGSN (The service network basically) sends an authentication data request to the HE / HLR (The home env.) what does the HE do? |
|
Definition
Generate authentication vectors |
|
|
Term
What happens after the HE generates the auth vectors? |
|
Definition
The HE sends the auth data response which the VLR / SGSN stores |
|
|
Term
What does the VLR / SGSN do when he receives the user auth response from the MS (consisting of the RES) |
|
Definition
It compares the RES to the XRES
Then selects the CK and IK. |
|
|