|
The COMP128 algorithms are implementations of the A3 and A8 algorithms defined in the GSM standard. The A3 algorithm is used to authenticate the mobile station to the network. The A8 algorithm is used to generate the session key used by A5 to encrypt the data transmitted between the mobile station and the BTS. Currently there exist four versions of COMP128. The first three were originally confidential. A partial description of the first version was leaked in 1997 and completed via reverse engineering. This led to a full publication in 1998.〔 The second and third versions were obtained via reverse engineering of software which verifies SIM cards compliance.〔 ==Introduction== For details on the way A3 and A8 are used see Authentication Center. A3 and A8 both take a 128 bits key (''Ki'') and a 128 bits challenge (''RAND'') as inputs. A3 produces a 32 bits response (''SRES'') and A8 produces a 64 bits session key (''Kc''). The COMP128 algorithms combine the functionality of A3 and A8. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「COMP128」の詳細全文を読む スポンサード リンク
|