Escolar Documentos
Profissional Documentos
Cultura Documentos
Contents
Contents
10 Ciphering Mode Setting Procedure....................................................................................10-1
10.1 Overview.......................................................................................................................................................10-2
10.2 Normal Procedure.........................................................................................................................................10-2
10.3 Internal Handling of BSC.............................................................................................................................10-3
10.4 Abnormal Procedure.....................................................................................................................................10-4
10.4.1 Ciphering Rejected..............................................................................................................................10-4
10.4.2 MS Not Ciphered ................................................................................................................................10-4
Issue 01 (2007-03-15)
Figures
Figures
Figure 10-1 Normal ciphering mode setting procedure......................................................................................10-2
ii
Issue 01 (2007-03-15)
10
Description
10.1 Overview
10.2 Normal
Procedure
10.3 Internal
Handling of BSC
10.4 Abnormal
Procedure
Issue 01 (2007-03-15)
10-1
10.1 Overview
The ciphering mode setting procedure is generally used in service requests such as location
update, service access, and inter-office handover. It requires the support from GSM network
equipment, especially BTS, and also depends on the encryption support capabilities of an MS.
MS
MSC
BSC
Step 1 MSC sends a Cipher Mode CMD message to BSC, indicating whether ciphering shall be used
or not, which algorithm and Kc to use, and whether MSC requests MS to include its IMEI in
the Ciphering Mode CMP message.
Step 2 BSC decides which algorithm it shall adopt according to the encryption algorithm contained
in the Cipher Mode CMD message, the one allowed by BSC, and the one supported by MS,
and then notifies BTS.
Step 3 BSC sends the command CIPHERING MODE CMD to MS, notifying it about the selected
encryption algorithm.
Step 4 Upon receipt of the command CIPHERING MODE CMD, MS initiates the transmission in
ciphered mode, and returns a Ciphering Mode CMP message to BSC.
Step 5 Upon receipt of the Ciphering Mode CMP message, BSC forwards the message to MSC.
----End
Procedure explanation
Step 1 Encryption algorithm A5
As specified in the GSM protocols, there are total 8 encryption algorithms, i.e. A5/0~A5/7.
A5/0 indicates "Not ciphered". The ciphering mode setting procedure is always initiated by
10-2
Issue 01 (2007-03-15)
the network. The required encryption algorithm is specified in the encryption IE of the Cipher
Mode CMD message.
Step 2 Encryption algorithm selection
When MS initiates a call request, classmark 2 and classmark 3 may be contained in the CM
SERV REQ message (In system information, when ECSC=1, MS shall report classmark 3 in
the CM SERV REQ message. When ECSC = 0, only by changing the classmark or through
the classmark updating procedure, can MS report classmark 3. Therefore, it is recommended
that ECSC be configured as "1"), which contains the information about the encryption
algorithm supported by MS. According to the ciphering data configuration, MSC delivers
CIPHER MODE CMD to BSC. BSC comprehensively considers the encryption algorithm
indicated in the command which is allowed by MSC, the encryption algorithm allowed in
BSC data configuration and the one supported by MS which is indicated in the CM SERV
REQ message, and selects the intersection. Then BSC selects an appropriate algorithm from
the intersection, by adopting the method of reverse order (In other words, algorithm selection
priorities decline in the order of A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 > A5/2 > A5/1 >
A5/0).
Step 3 Encryption in the handover procedure
In the handover procedure, the Handover Request message contains an encryption IE, which
indicates the to-be-used encryption algorithm and Kc. If either of the A interfaces of 2 BSSs is
in Phase 1, due to the defect of the ETSI GSM Phase I protocol (There is no ciphering mode
setting IE in the handover command), inter-BSC handover can be performed normally only
when the two BSCs select the same algorithm (e.g. merely select A5/0, or A5/2). Otherwise,
special processing is required in the destination MSC/BSC, or the originating MSC/BSC (e.g.
modify the inter-BSC handover command).
Therefore, in the interconnection of A interfaces under ciphered mode, the user should learn
the difference of data configuration for the encryption function between different
manufacturers. Unsuccessful interconnection has ever occurred during a to-BSC handover.
----End
Issue 01 (2007-03-15)
10-3
10-4
Issue 01 (2007-03-15)