| Figure 1 | Generation of quintets in the AuC |
| Figure 2 | Authentication and key derivation in the USIM |
| Figure 3 | Generation of re-synchronisation token in the USIM |
| Figure 4 | Re-synchronisation in the HLR/AuC |
| Figure 5 | Ciphering user and signalling data transmitted over the radio access link |
| Figure 6 | Derivation of MAC-I (or XMAC-I) on a signalling message |