Shared Flashcard Set

Details

Mobile security
AKA
37
Computer Science
Undergraduate 4
04/28/2012

Additional Computer Science Flashcards

 


 

Cards

Term
What does AKA authenticate between?
Definition
Network and user
User and network

(Mutual authentication)
Term
What two keys does AKA establish?
Definition
Integrity and cipher
Term
What was AKA designed to achieve?
Definition
Maximum compatibility with GSM
Term
What protocol is AKA based upon?
Definition
Challenge response
Term
What are the four AKA pre-requisites?
Definition
AuC and USIM share

AuC has a randon number generator

AuC has scheme to generate fresh sequence numbers

USIM has scheme to verify freshness of sequence numbers
Term
What is a key specific to?
Definition
Each user
Term
RAND is?
Definition
Random challenge generated by AuC
Term
XRES is?
Definition
Expected user response computed by AuC
Term
What is AuC?
Definition
Authentication centre
Term
What is RES?
Definition
Actual user response computed by USIM
Term
What is the CK?
Definition
Cipher key
Term
What is the IK?
Definition
Integrity key
Term
What is AK?
Definition
Anonymity key
Term
What is the AK used to do?
Definition
Concealing the SQN
Term
What is the SQN?
Definition
Sequence number
Term
What is AMF?
Definition
Authentication management field
Term
What is the AUTN?
Definition
Network authentication token
Term
What goes in to generate the AUTN?
Definition
SQN(+)AK / AMF / MAC
Term
What does f1 generate?
Definition
MAC / XMAC
Term
What goes into f1?
Definition
SQN, AMF, K, RAND
Term
What goes into f2?
Definition
Rand, K
Term
What does f2 generate?
Definition
XRES / RES
Term
What does f3 generate?
Definition
CK
Term
What goes into f3?
Definition
RAND, K
Term
What goes into f4?
Definition
RAND, K
Term
What does f4 generate?
Definition
IK
Term
What goes into f5?
Definition
RAND, K
Term
What does f5 generate?
Definition
RAND, K
Term
You have the AUTN, which consists of the SQN+AK / AMF / MAC as well as the RAND. How do you regenerate the SQN at the 'other end'?
Definition
You generate the AK by putting your RAND and KEY in. You minus the AK from the AK+SQN which gives you the SQN.
Term
What do you verify the SQN For?
Definition
That it is in the correct range
Term
When a user authentication requests comes from the VLR / SGSN to the mobile station, what two values are sent?
Definition
RAND and AUTN
Term
What does the mobile station do when it receives the user auth requests (It has the AUTN and RAND)
Definition
Verify the AUTN and compute the RES
Term
When a mobile statioc senda a user auth response what does he send with it?
Definition
Actual response (RES)
Term
What does the mobile station do after the user auth response is sent?
Definition
Compute the cipher and integrity key
Term
When the VLR / SGSN (The service network basically) sends an authentication data request to the HE / HLR (The home env.) what does the HE do?
Definition
Generate authentication vectors
Term
What happens after the HE generates the auth vectors?
Definition
The HE sends the auth data response which the VLR / SGSN stores
Term
What does the VLR / SGSN do when he receives the user auth response from the MS (consisting of the RES)
Definition
It compares the RES to the XRES

Then selects the CK and IK.
Supporting users have an ad free experience!