Submit Search
Upload
OJT 2G and 3G Security
•
Download as PPTX, PDF
•
1 like
•
226 views
V
Valeh Sabziyev
Follow
Report
Share
Report
Share
1 of 25
Download now
Recommended
Definition of Verizon Private Network
Definition of Verizon Private Network
Brent "Woody" Schaan
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
Naveen Kumar
Office in a box - Converged Applications Gateway
Office in a box - Converged Applications Gateway
SI3D systems
Practical advice for cloud data protection ulf mattsson - jun 2014
Practical advice for cloud data protection ulf mattsson - jun 2014
Ulf Mattsson
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks
3G4G
Tta 0081
Tta 0081
Hai Nguyen
Sierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open AT
Thibault Cantegrel
Open splice dds security
Open splice dds security
Ramzi Karoui
Recommended
Definition of Verizon Private Network
Definition of Verizon Private Network
Brent "Woody" Schaan
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
Naveen Kumar
Office in a box - Converged Applications Gateway
Office in a box - Converged Applications Gateway
SI3D systems
Practical advice for cloud data protection ulf mattsson - jun 2014
Practical advice for cloud data protection ulf mattsson - jun 2014
Ulf Mattsson
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks
3G4G
Tta 0081
Tta 0081
Hai Nguyen
Sierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open AT
Thibault Cantegrel
Open splice dds security
Open splice dds security
Ramzi Karoui
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
Rizal Broer
CLOUD ZERO TRUST MODEL
CLOUD ZERO TRUST MODEL
Fayyaz Ahmed MASc, MSc, MS IT, MCS, CE, CET ✔
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdf
arkleatheray
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
IRJET Journal
Datapower Steven Cawn
Datapower Steven Cawn
Valeri Illescas
Azure Security Overview
Azure Security Overview
Allen Brokken
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
BenAissaTaher1
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET Journal
Security model evaluation of 3 g
Security model evaluation of 3 g
Rotract CLUB of BSAU
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
Brad Brown
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10
Rizal Broer
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
niravmahida
General Version 9 21 09
General Version 9 21 09
tverbeck
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Luis Lobo e Silva
Basic Network Support Certification
Basic Network Support Certification
Vskills
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
Rizal Broer
More Related Content
Similar to OJT 2G and 3G Security
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
Rizal Broer
CLOUD ZERO TRUST MODEL
CLOUD ZERO TRUST MODEL
Fayyaz Ahmed MASc, MSc, MS IT, MCS, CE, CET ✔
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdf
arkleatheray
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
IRJET Journal
Datapower Steven Cawn
Datapower Steven Cawn
Valeri Illescas
Azure Security Overview
Azure Security Overview
Allen Brokken
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
BenAissaTaher1
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET Journal
Security model evaluation of 3 g
Security model evaluation of 3 g
Rotract CLUB of BSAU
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
Brad Brown
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10
Rizal Broer
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
niravmahida
General Version 9 21 09
General Version 9 21 09
tverbeck
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Luis Lobo e Silva
Basic Network Support Certification
Basic Network Support Certification
Vskills
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
Rizal Broer
Similar to OJT 2G and 3G Security
(20)
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
CLOUD ZERO TRUST MODEL
CLOUD ZERO TRUST MODEL
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdf
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
Datapower Steven Cawn
Datapower Steven Cawn
Azure Security Overview
Azure Security Overview
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
Security model evaluation of 3 g
Security model evaluation of 3 g
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
General Version 9 21 09
General Version 9 21 09
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Basic Network Support Certification
Basic Network Support Certification
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
OJT 2G and 3G Security
1.
2G[1] and 3G[2]
Security & Charging, Data Rating, Authentication Concepts by Valeh Sabziyev
2.
2G Security Identity Confidentiality MS
Authentication A3 algorithm Information Confidentiality A8 & A5 algorithms
3.
2G Authentication Procedure
4.
2G Authentication Procedure
5.
2G Ciphering Key
Setting
6.
2G Ciphering
7.
3G Security Identity Confidentiality MS
and Network Authentication f1, f2, f3, f3, f5 functions Information Confidentiality f8 function Information Integrity f9 function
8.
3G Vector Generation
9.
3G Authentication Vectors
10.
3G Authentication Vectors
11.
Security mode setup
12.
Integrity Function
13.
Ciphering Function
14.
f9[3]
15.
f8[3]
16.
KASUMI[4] - 8-round Feistel
cipher - 64-bit data block - 128-bit key
17.
Data rating, charging,
RADIUS authentication
18.
RADIUS protocol - On
top of UDP - Client-Server Model - Uses shared secret - Extensible
19.
RADIUS message format[5]
20.
Access Request
21.
Access Response
22.
DIAMETER Message Format[6]
23.
Credit Control Request
24.
References 1. 3GPP TS
43.020, Security Related Network Functions 2. ETSI TS 133 102, 3G Security, Security Architecture 3. 3GPP TS 35.201, f8 and f9 Specifications 4. 3GPP TS 35.202, KASUMI Specifications 5. RFC 2865, Remote Authentication Dial-In User Service 6. RFC 3588, Diameter Base Protocol
25.
thanks for your time.
Download now