Ciphering Procedure in GSM Call Flow

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

ASSIGNMENT

CIPHERING PROCEDURE IN GSM CALL FLOW


Ciphering is used to secure the information exchange between an MS and a BTS. The information consists of the signaling information and the subscriber information. The subscriber information consists of the subscriber data and the subscriber voice.

Signaling Procedure:

The ciphering procedure is as follows: 1. The MSC sends the BSC a Ciphering Mode Command message. The Ciphering Mode Command message carries the required ciphering algorithms including A5/0, the ciphering key Kc, and whether the Ciphering Mode Complete message sent by the MS must carry the IMEI. 2. According to the ciphering algorithm in the Ciphering Mode Command message, the ciphering algorithm allowed by the BSC, and the ciphering algorithm supported by the MS, the BSC determines the algorithm to be used and notifies the BTS. 3. The BTS sends the Ciphering Mode Command message to notify the MS of the ciphering algorithm. 4. Upon receiving the Ciphering Mode Command message, the MS starts sending the ciphering mode and then responds the BSC with a Cipher Mode Complete message.

ASSIGNMENT

5. Upon receiving the Ciphering Mode Complete message from the MS, the BSC notifies the MSC of the ciphering completion.

CIPHER MODE COMMAND MESSAGE:


The MSC sends a Ciphering Mode Change command, and the BTS performs the ciphering mode change. The BTS performs and manages ciphering. The BSC does no processing. If the ciphering mode is changed, 1. The BTS performs the sending configuration in old mode and the receiving configuration in new mode. 2. The MS is configured in a completely new mode, including transmission and reception. 3. The BTS is configured in a completely new mode.

ENCRYPTION COMMAND MESSAGE:


Encryption occurs in service requests such as location updating, service access, and inter-office handover. It requires the support of GSM network equipment (especially BTS), as well as the encryption ability of MS. 1. MSC sends BSC a Ciphering Mode CMD that contains encryption algorithm, Kc, and whether the MS is required to add IMEI in Ciphering Mode CMP. 2. BSC decides the final algorithm based on the encryption algorithm in Ciphering Mode CMD, the encryption algorithm that BSC allows, and the encryption algorithm that MS supports, and then inform BTS. 3. BSC sends MS Ciphering Mode CMD to inform MS of the selected encryption algorithm. 4. After receiving Ciphering Mode CMD, MS starts the transmission of ciphering mode and sends Ciphering Mode CMP to the system. 5. After receiving the Ciphering Mode CMP from MS, BSC transfer it to MSC.

ASSIGNMENT

CIPHER MODE COMPLETE MESSAGE:


The MS starts to decipher and to encipher using its available ciphering key. It then returns to the BTS, in encrypted form, the CIPHER MODE COMPLETE message (d) or the next message it is due to send. The message includes the IMEI, if required by the MSC. On receiving the CIPHER MODE COMPLETE message (or any correctly enciphered layer 2 frame), the BTS starts enciphering and forwards the message via the BSC to the MSC. If the ciphering procedure fails, the MSC takes the appropriate action.

You might also like