Ciphering Procedure in GSM Call Flow
Ciphering Procedure in GSM Call Flow
Ciphering Procedure in GSM Call Flow
When ciphering is active, all information exchanged between the mobile and the network on the dedicated radio channels is encrypted. The key previously set between the network and the MS is used to encipher and to decipher the encrypted information. During the ciphering procedure the ciphering key Kc is set between the network and the MS. Ciphering is initiated after the ciphering key is set on the dedicated signalling channel (SDCCH or FACCH). The GSM uses stream ciphering, which means that the data flow transmitted on the SDCCH/TCH is the binary bit by bit addition of the user data flow to a ciphering bit stream. If ciphering algorithm is changed during Assignment or Handover then BSC passes the cipher mode setting to the MS in Assignment Command or Handover Command message. In an MSC-controlled handover, the MSC tells the new BSS whether encryption is required in the HANDOVER REQUEST message. In a BSC-controlled handover, the BSC passes the encryption information to the target BTS on the activation of the channels if the encryption information was received from the MSC.
CIPHER MODE COMMAND message The MSC sends the CIPHER MODE COMMAND message (a) to the BSC to indicate whether ciphering is required and if so, to indicate the ciphering key. The CIPHER MODE COMMAND message (from the MSC to the BSC) contains the following data:
message type layer 3 header information encryption information: permitted algorithms and ciphering key cipher response mode.
The message contains the encryption instructions and the L3 header information for the MS. When ciphering is required, the encryption information element contains information for the BTS to load the encryption device with the appropriate key. ENCRYPTION COMMAND message On receiving the CIPHER MODE COMMAND message, the BSC selects the algorithm to be used according to the list of permitted algorithms included in the message and the algorithms that are supported by that particular BSS. See Support for different ciphering algorithms for details. Regardless of whether ciphering is to be activated, the BSC stores the encryption information, including the selected algorithm for possible subsequent handovers, and passes the encryption information to the BTS in the ENCRYPTION COMMAND message (b). The ENCRYPTION COMMAND message contains the following data:
message header encryption information: selected algorithm and ciphering key link identifier L3 ciphering mode command to MS message header cipher mode setting: no ciphering/start ciphering cipher response: the cipher response element is used if received from the MSC (optional).
The BTS analyses the ENCRYPTION COMMAND message. If encryption is required, the BTS activates the demodulator to decipher. Regardless of whether ciphering is required, the BTS sends the CIPHER MODE COMMAND message (c) to the MS. CIPHER MODE COMPLETE message The MS starts to decipher and to encipher using its available ciphering key. It then returns to the BTS, in encrypted form, the CIPHER MODE COMPLETE message (d) or the next message it is due to send. The message includes the IMEI, if required by the MSC. On receiving the CIPHER MODE COMPLETE message (or any correctly enciphered layer 2 frame), the BTS starts enciphering and forwards the message via the BSC to the MSC. If the ciphering procedure fails, the MSC takes the appropriate action. Support for different ciphering algorithms The MSC may send a list of permitted ciphering algorithms to the BSC in the CIPHER MODE COMMAND message. The BSC selects the algorithm to be used from this list according to the algorithms that are supported by the BSS. If the BSS supports several algorithms, the BSC makes the selection according to the following preference:
1. A5/3 2. A5/1 3. A5/0 (no ciphering) Algorithms other than the ones mentioned above cannot be used. If the BSS does not support any of the permitted algorithms, the BSC sends the CIPHER MODE REJECT message to the MSC. The MSC then decides on further action.