Crypto U12 (part 2), crypto for mobile telecom

Description

IYM002 (Unit 12 - Crypto Systems) Mind Map on Crypto U12 (part 2), crypto for mobile telecom, created by jjanesko on 28/04/2013.
jjanesko
Mind Map by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko over 11 years ago
81
10

Resource summary

Crypto U12 (part 2), crypto for mobile telecom
  1. GSM and UMTS key management
    1. generation
      1. user keys are generated by SIM manufacturer
        1. user keys installed on SIM
        2. establishment
          1. established with user X when SIM is given to the user
            1. user key is also given to carrier by the SIM manufacturer
            2. storage
              1. user key is stored on tamper resistant SIM
                1. session keys (encryption and MAC) thrown away after each use
                2. usage
                  1. user key only exposed briefly to encryt challenge response to base station
                3. key hiearchy diagram

                  Attachments:

                  Show full summary Hide full summary

                  Similar

                  Crypto U12 (part 1), crypto for mobile telecom
                  jjanesko
                  Crypto U12, SSL
                  jjanesko
                  Crypto U12, WLAN
                  jjanesko
                  Crypto U12 GSM,UTMS Hierarchy Diagram
                  jjanesko
                  Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                  jjanesko
                  Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                  jjanesko
                  Crypto U1, Basic Principles
                  jjanesko
                  Crypto U3, Theoretical vs. Practical Security
                  jjanesko
                  Crypto U4, Stream Cipher
                  jjanesko
                  Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                  jjanesko
                  Crypto U4, Block Cipher, Counter Mode
                  jjanesko