Friends, how to generate an Encryption Mask (VP Mask)?
drolet_55 13-May-2008 12:01:20 AM

Comments


www.multichannel.com/.../191126-Cable_Show_2009_Technologists_Outline_Next_Generation_Services.php
Posted by crouse


www.sharewareconnection.com/titles/mask.htm
Posted by crouse


AC uses SSD_B and the CAVE algorithm.
Posted by waqqas1


AC (or VLR if SSD is shared) uses SSD_B and the CAVE algorithm.
Posted by jzhang


Encryption keys (masks) are needed to encrypt the traffic channels, and the encryption keys are generated on a per-call basis. The mobile station generates the keys at the same time that the network generates the keys during the call setup process.

Voice Privacy (VP). VP, as its name implies, encrypts the voice signal that goes over the traffic channel between the mobile station and the serving base station.

The network generates the keys in the Home Location Register/Authentication Center (HLR/AC) and then provides them to the anchor MSC and the serving base station.

The same keys are used for the duration of the call, even if the mobile station is handed off to another MSC. Therefore, if the keys have already been provided to the anchor MSC, and the mobile station moves into the service area of another MSC, the keys must be passed in an inter-exchange handoff in order to enable the new serving MSC to encrypt the voice and/or control signals.
Posted by sagitraz



Posted: 13-May-2008 10:05:18 AM By: sagitraz

Encryption keys (masks) are needed to encrypt the traffic channels, and the encryption keys are generated on a per-call basis. The mobile station generates the keys at the same time that the network generates the keys during the call setup process.

Voice Privacy (VP). VP, as its name implies, encrypts the voice signal that goes over the traffic channel between the mobile station and the serving base station.

The network generates the keys in the Home Location Register/Authentication Center (HLR/AC) and then provides them to the anchor MSC and the serving base station.

The same keys are used for the duration of the call, even if the mobile station is handed off to another MSC. Therefore, if the keys have already been provided to the anchor MSC, and the mobile station moves into the service area of another MSC, the keys must be passed in an inter-exchange handoff in order to enable the new serving MSC to encrypt the voice and/or control signals.

Posted: 13-May-2008 11:45:11 AM By: jzhang

AC (or VLR if SSD is shared) uses SSD_B and the CAVE algorithm.

Posted: 30-December-2008 02:59:28 PM By: waqqas1

AC uses SSD_B and the CAVE algorithm.

Posted: 07-September-2009 02:23:29 PM By: crouse

www.sharewareconnection.com/titles/mask.htm

Posted: 07-September-2009 02:30:53 PM By: crouse

www.multichannel.com/.../191126-Cable_Show_2009_Technologists_Outline_Next_Generation_Services.php