10 likes | 143 Views
This document presents an overview of IIF interworking with no Service Order (SO). It highlights the critical role of SIM cards in security-related information requests, showcasing the authentication process via AUTHREQ. Key parameters such as RAND, SRES, and Kc are defined, alongside their interaction with GSMSC and IS-41 HLR. The SIM card utilizes CAVE and A8 algorithms to compute AUTHU and SSD-B, integral to maintaining secure communications. Additionally, the minimum necessary parameters for roaming and unique challenge responses are discussed for efficient authentication.
E N D
Comments This figure indicates the example of IIF interworking without Service Order (SO). SIM Card *2 Security Related Information Request AUTHREQ *2 *2 authreq Authentication Vector Response GSM MSC (RAND, SRES, Kc) (RANDU, AUTHU) *1 IS-41 HLR IIF RANDU (24bits) AUTHU (18bits) } } This SIM Card includes CAVE and A8 algorithm, and calculate AUTHU and SSD-B. AUTHU is contained in the SRES parameter. The SSD-B acts as Kc (ciphering key). And, this SIM Card contains MIN, ESN, fixed SSD-A and AAV parameter. 128bits 32bits RAND SRES AUTHU : AuthenticationResponseUniqueChallenge RANDU : RandVariableUniqueChallenge AAV : AuthenticationAlgorithmVersion *1 : HLR needs to contain fixed SSD-A for the roamer to GSM. *2 : This message is sent x times.