null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
59744
Crypto U12 (part 2), crypto for mobile telecom
Description
IYM002 (Unit 12 - Crypto Systems) Mind Map on Crypto U12 (part 2), crypto for mobile telecom, created by jjanesko on 28/04/2013.
No tags specified
iym002
unit 12 - crypto systems
iym002
unit 12 - crypto systems
Mind Map by
jjanesko
, updated more than 1 year ago
More
Less
Created by
jjanesko
over 11 years ago
81
10
0
Resource summary
Crypto U12 (part 2), crypto for mobile telecom
GSM and UMTS key management
generation
user keys are generated by SIM manufacturer
user keys installed on SIM
establishment
established with user X when SIM is given to the user
user key is also given to carrier by the SIM manufacturer
storage
user key is stored on tamper resistant SIM
session keys (encryption and MAC) thrown away after each use
usage
user key only exposed briefly to encryt challenge response to base station
key hiearchy diagram
Attachments:
Crypto U12 GSM,UTMS Hierarchy Diagram
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Crypto U12 (part 1), crypto for mobile telecom
jjanesko
Crypto U12, SSL
jjanesko
Crypto U12, WLAN
jjanesko
Crypto U12 GSM,UTMS Hierarchy Diagram
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Browse Library