4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Morning, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
How do I monitor SS7 Traffic in spectra2?
what is the difference between E1 signal & Ethernet signal ?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Can you tell me about PBGT?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is demarc point?
What is BSC?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
Explain SLTA and SLTM messages in MTP3?
why cellphone towers are painted in red and white?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

Explain Encrypted Communications between AC or A-Key?
cdmaguru 24-May-2008 07:28:56 AM

Comments


The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.
Posted by jahangir1983


The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.
Posted by jahangir1983


The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.
Posted by jahangir1983


In short A-key is stored in AC and provide encryption between AC and system, operation and AC, through ought system where A-key exists.
Posted by HamidAliKhan


A-key is stored in AC and provide encryption between AC and system, operation and AC, throughought system where A-key exists.
Posted by waqqas1


■=> Encryption throughout administrative/provisioning system
■=> Encryption between AC and administrative/provisioning system
■=> Encryption between point of A-Key generation and AC
■=> Encryption between operations system and AC (i.e., maintenance terminal)
■=> Encryption over any network where A-Keys are transported
Posted by michaelchristopher


The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.
Posted by sagitraz

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
Describe RTP Packet Error Handling ?
 
What are Application integration commands you can use in your Dialplan (extensions.conf)?
Explain the concept of GPON?


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved