- Home Page of ProjectGuideline.com ›
- Forums ›
- Discussions about TCPIP protocol ›
- UMTS security question
Shrinivas
Participant
I need details about the authentication procedure in UMTS. I know the steps. I have read several papers about it. But the details about HOW the procedures are implemented aren’t available anywhere!
Ex: the home sends the user a random challenge(128 bit) and the user uses its secret key and the random challenge to compute a result using A3,A5,A8 algorithm and sends the result to the Home. The home checks this result with the expected result and then authenticates the user.
Here there are no details about the actual computaional procedure or what the algorithms contain! I need the details since i want to implement this in a simulation for my project.
Please help.
Thank you.
Viewing 0 reply threads
You must be logged in to reply to this topic.