GSM Question: Download GSM Technology PDF

Name the algorithms used in following?
a. Ciphering
b. Authentication

Tweet Share WhatsApp

Answer:

★ Ciphering
The algorithm 129-EEA3 and 128-EIA3, 3GPP Confidentiality and Integrity Algorithm is used for ciphering in GSM
★ Authentication
The algorithm by name A3 is used for authentication in the GSM systems
This algorithm is used in implementing Subscriber Identity Module.

Download GSM Technology PDF Read All 54 GSM Technology Questions
Previous QuestionNext Question
Which up-link/ down-link spectrum is allocated to following?
a. GSM - 900
b. DCS - 1800
What is equalisation in GSM Technology