The present document contains an example set of algorithms which may be used as the GSM authentication and key generation functions A3 and A8. (It is not mandatory that the particular algorithms specified in this document are used - the A3 and A8 functions are operator-specifiable rather than being fully standardised).
Section 3 (normative) introduces the algorithms and describes their input and output parameters. Section 4 (normative) defines the algorithms. Section 5 (informative) describes an alternative algorithm that some operators may prefer.
Section 6 (informative) provides test data.
| Edition : | 14.0.0 |
| File Size : | 1
file
, 98 KB |
| Note : | This product is unavailable in Russia, Ukraine, Belarus |
| Number of Pages : | 17 |
| Published : | 04/01/2017 |