Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 23.008  Word version:  18.1.0

Top   Top   Up   Prev   Next
0…   2…   2.3…   2.4…   2.5…   2.8…   2.10…   2.13…   2.13.50…   2.13.100…   2.13.150…   2.14…   2.16…   2.22…   2.23…   2.25…   3…   3.2…   3.4…   3.10…   3.13…   3.14…   3.15…   4…   5.1   5.2   5.2A   5.2B   5.3   5.4…   5.6…   5.8…   5.10…

 

2.3  Data related to authentication and cipheringp. 26

2.3.1  Random Number (RAND), Signed Response (SRES) and Ciphering Key (Kc)p. 26

Random Number (RAND), Signed Response (SRES) and Ciphering Key (Kc) form a triplet vector used for authentication and encryption as defined in TS 43.020.
For GSM users, triplet vectors are calculated in the 2G AuC and provided to the 2G HLR (see GSM 12.03 [36]), and for UMTS users triplet vectors are derived from quintuplet vectors in the 3G HLR or 3G VLR, if needed (see TS 33.102).
A set of up to 5 triplet values are sent from the 2G HLR to the VLR and the SGSN on request. These data are temporary subscriber data conditionally stored in the VLR and the SGSN.
Up

2.3.2  Random Challenge (RAND), Expected Response (XRES), Cipher Key (CK), Integrity Key(IK) and Authentication Token(AUTN), KASMEp. 26

Random Challenge (RAND), Expected Response (XRES), Cipher Key (CK), Integrity Key(IK) and Authentication Token (AUTN) form a quintuplet vector used for user authentication, data confidentiality and data integrity as defined in TS 33.102.
Random Challenge (RAND), Expected Response (XRES), Key for Access Security Management Entity (KASME) and Authentication Token (AUTN) form an EPS vector used for user authentication, data confidentiality and data integrity as defined in TS 33.401.
When both HLR and VLR or SGSN are 3G, a set of quintuplet vectors are calculated in the AuC, and up to 5 quintuplets are sent from the HLR to the VLR and to the SGSN on request (see TS 29.002). These data are temporary subscriber data conditionally stored in the HLR, the VLR and the SGSN.
When the HLR is 2G and the VLR or SGSN are 3G, quintuplet vectors are derived by the 3G VLR or SGSN from the received triplet vectors from the HLR, if needed (see TS 33.102).
Up

2.3.3  The Ciphering Key Sequence Number (CKSN)p. 27

The Ciphering Key Sequence Number (CKSN) is used to ensure GSM authentication information (Kc) consistency between the MS and the VLR and between the MS and the SGSN.
CKSN and its handling are defined in TS 24.008 and TS 43.020. It is a temporary subscriber data and is stored in the VLR and in the SGSN.

2.3.4  The Key Set Identifier (KSI)p. 27

The Key Set Identifier (KSI) is used to ensure UMTS authentication information (CK and IK) consistency between the MS and the VLR and between the MS and the SGSN.
For EPS the Key Set Identifier (KSI also noted KSIASME ) is used to ensure EPS authentication information (KASME) consistency between the MS and the MME.
KSI and its handling are defined in UMTS TS 24.008 and UMTS TS 33.102. It is temporary subscriber data and is stored in the VLR and the SGSN.
KSIASME and its handling are defined in TS 23.401. It is temporary subscriber data and is stored in the MME.
Up

2.3.5  Selected Ciphering Algorithmp. 27

Selected Ciphering Algorithm is defined in TS 23.060.
Selected Ciphering Algorithm is temporary subscriber data stored in the SGSN.

2.3.6  Current Kcp. 27

Current Kc is defined in TS 43.020.
Current Kc is temporary subscriber data stored in the SGSN.

2.3.7  P-TMSI Signaturep. 27

P-TMSI Signature is defined in TSs TS 23.003 and TS 23.060. It is used for identification checking purposes.
P-TMSI Signature is temporary subscriber data and is conditionally stored in the SGSN.

2.3.8  Access Network Identity (ANID) |R8|p. 27

Access Network Identity is defined in TSs TS 24.302 and TS 29.273.
ANID is temporary subscriber data stored in HSS and 3GPP AAA server.

2.3.9  Key Status |R11|p. 27

Key Status is defined in TS 25.413.
Key Status is temporary subscriber data stored in VLR and SGSN.

Up   Top   ToC