Ciphering

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

1.

Ciphering procedure in GSM call flow

Ciphering is one of the security procedures designed to protect the subscriber identity and
data. It is an optional procedure in GSM. When ciphering is active, all information exchanged
between the mobile and the network on the dedicated radio channels is encrypted. The key
previously set between the network and the MS is used to encipher and to decipher the
encrypted information.
During the ciphering procedure the ciphering key Kc is set between the network and the MS.
Ciphering is initiated after the ciphering key is set on the dedicated signaling channel
(SDCCH or FACCH).
The GSM uses stream ciphering, which means that the data flow transmitted on the
SDCCH/TCH is the binary bit by bit addition of the user data flow to a ciphering bit stream.
If ciphering algorithm is changed during Assignment or Handover then BSC passes the
cipher mode setting to the MS in Assignment Command or Handover Command message.
In an MSC-controlled handover, the MSC tells the new BSS whether encryption is required in
the HANDOVER REQUEST message.
In a BSC-controlled handover, the BSC passes the encryption information to the target BTS
on the activation of the channels if the encryption information was received from the MSC.

1. CIPHER MODE COMMAND message


The MSC sends the CIPHER MODE COMMAND message (a) to the BSC to indicate
whether ciphering is required and if so, to indicate the ciphering key.
The CIPHER MODE COMMAND message (from the MSC to the BSC) contains the
following data:
o

message type

layer 3 header information

encryption information: permitted algorithms and ciphering key

cipher response mode.

The message contains the encryption instructions and the L3 header information for the MS.
When ciphering is required, the encryption information element contains information for the
BTS to load the encryption device with the appropriate key.
ENCRYPTION COMMAND message
On receiving the CIPHER MODE COMMAND message, the BSC selects the algorithm to be
used according to the list of permitted algorithms included in the message and the
algorithms that are supported by that particular BSS. See Support for different ciphering
algorithms for details.
Regardless of whether ciphering is to be activated, the BSC stores the encryption
information, including the selected algorithm for possible subsequent handovers, and passes
the encryption information to the BTS in the ENCRYPTION COMMAND message (b).
The ENCRYPTION COMMAND message contains the following data:
o

message header

encryption information: selected algorithm and ciphering key

link identifier

L3 ciphering mode command to MS

message header

cipher mode setting: no ciphering/start ciphering

cipher response: the cipher response element is used if received


from the MSC (optional).

The BTS analyses the ENCRYPTION COMMAND message. If encryption is required, the BTS
activates the demodulator to decipher. Regardless of whether ciphering is required, the BTS
sends the CIPHER MODE COMMAND message (c) to the MS.
CIPHER MODE COMPLETE message
The MS starts to decipher and to encipher using its available ciphering key. It then returns to
the BTS, in encrypted form, the CIPHER MODE COMPLETE message (d) or the next message
it is due to send. The message includes the IMEI, if required by the MSC.
On receiving the CIPHER MODE COMPLETE message (or any correctly enciphered layer 2
frame), the BTS starts enciphering and forwards the message via the BSC to the MSC.
If the ciphering procedure fails, the MSC takes the appropriate action.

Support for different ciphering algorithms


The MSC may send a list of permitted ciphering algorithms to the BSC in the CIPHER MODE
COMMAND message. The BSC selects the algorithm to be used from this list according to the
algorithms that are supported by the BSS. If the BSS supports several algorithms, the BSC
makes the selection according to the following preference:
1. A5/3
2. A5/1
3. A5/0 (no ciphering)
Algorithms other than the ones mentioned above cannot be used.

You might also like