Você está na página 1de 6

M900/M1800 Base Station Subsystem

Signaling Analysis Manual

Contents

Contents
10 Ciphering Mode Setting Procedure....................................................................................10-1
10.1 Overview.......................................................................................................................................................10-2
10.2 Normal Procedure.........................................................................................................................................10-2
10.3 Internal Handling of BSC.............................................................................................................................10-3
10.4 Abnormal Procedure.....................................................................................................................................10-4
10.4.1 Ciphering Rejected..............................................................................................................................10-4
10.4.2 MS Not Ciphered ................................................................................................................................10-4

Issue 01 (2007-03-15)

Huawei Technologies Proprietary

M900/M1800 Base Station Subsystem


Signaling Analysis Manual

Figures

Figures
Figure 10-1 Normal ciphering mode setting procedure......................................................................................10-2

ii

Huawei Technologies Proprietary

Issue 01 (2007-03-15)

M900/M1800 Base Station Subsystem


Signaling Analysis Manual

10

10 Ciphering Mode Setting Procedure

Ciphering Mode Setting Procedure

About This Chapter


The following table lists the contents of this chapter.
Title

Description

10.1 Overview

Introduces ciphering mode setting procedures and the requirements for


other devices.

10.2 Normal
Procedure

Describes normal ciphering mode setting procedures.

10.3 Internal
Handling of BSC

Describes the BSC internal handling in ciphering mode setting


procedures.

10.4 Abnormal
Procedure

Describes abnormal ciphering mode setting procedures and offers


guidance to troubleshooting.

Issue 01 (2007-03-15)

Huawei Technologies Proprietary

10-1

M900/M1800 Base Station Subsystem


Signaling Analysis Manual

10 Ciphering Mode Setting Procedure

10.1 Overview
The ciphering mode setting procedure is generally used in service requests such as location
update, service access, and inter-office handover. It requires the support from GSM network
equipment, especially BTS, and also depends on the encryption support capabilities of an MS.

10.2 Normal Procedure


Signaling procedure
Figure 10-1 Normal ciphering mode setting procedure
BTS

MS

MSC

BSC

Cipher Mode CMD (1)


Encryption Mode CMD (2)
Ciphering Mode CMD (3)
Ciphering Mode CMP (4)
Cipher Mode CMP (5)

Step 1 MSC sends a Cipher Mode CMD message to BSC, indicating whether ciphering shall be used
or not, which algorithm and Kc to use, and whether MSC requests MS to include its IMEI in
the Ciphering Mode CMP message.
Step 2 BSC decides which algorithm it shall adopt according to the encryption algorithm contained
in the Cipher Mode CMD message, the one allowed by BSC, and the one supported by MS,
and then notifies BTS.
Step 3 BSC sends the command CIPHERING MODE CMD to MS, notifying it about the selected
encryption algorithm.
Step 4 Upon receipt of the command CIPHERING MODE CMD, MS initiates the transmission in
ciphered mode, and returns a Ciphering Mode CMP message to BSC.
Step 5 Upon receipt of the Ciphering Mode CMP message, BSC forwards the message to MSC.
----End

Procedure explanation
Step 1 Encryption algorithm A5
As specified in the GSM protocols, there are total 8 encryption algorithms, i.e. A5/0~A5/7.
A5/0 indicates "Not ciphered". The ciphering mode setting procedure is always initiated by

10-2

Huawei Technologies Proprietary

Issue 01 (2007-03-15)

M900/M1800 Base Station Subsystem


Signaling Analysis Manual

10 Ciphering Mode Setting Procedure

the network. The required encryption algorithm is specified in the encryption IE of the Cipher
Mode CMD message.
Step 2 Encryption algorithm selection
When MS initiates a call request, classmark 2 and classmark 3 may be contained in the CM
SERV REQ message (In system information, when ECSC=1, MS shall report classmark 3 in
the CM SERV REQ message. When ECSC = 0, only by changing the classmark or through
the classmark updating procedure, can MS report classmark 3. Therefore, it is recommended
that ECSC be configured as "1"), which contains the information about the encryption
algorithm supported by MS. According to the ciphering data configuration, MSC delivers
CIPHER MODE CMD to BSC. BSC comprehensively considers the encryption algorithm
indicated in the command which is allowed by MSC, the encryption algorithm allowed in
BSC data configuration and the one supported by MS which is indicated in the CM SERV
REQ message, and selects the intersection. Then BSC selects an appropriate algorithm from
the intersection, by adopting the method of reverse order (In other words, algorithm selection
priorities decline in the order of A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 > A5/2 > A5/1 >
A5/0).
Step 3 Encryption in the handover procedure
In the handover procedure, the Handover Request message contains an encryption IE, which
indicates the to-be-used encryption algorithm and Kc. If either of the A interfaces of 2 BSSs is
in Phase 1, due to the defect of the ETSI GSM Phase I protocol (There is no ciphering mode
setting IE in the handover command), inter-BSC handover can be performed normally only
when the two BSCs select the same algorithm (e.g. merely select A5/0, or A5/2). Otherwise,
special processing is required in the destination MSC/BSC, or the originating MSC/BSC (e.g.
modify the inter-BSC handover command).
Therefore, in the interconnection of A interfaces under ciphered mode, the user should learn
the difference of data configuration for the encryption function between different
manufacturers. Unsuccessful interconnection has ever occurred during a to-BSC handover.
----End

10.3 Internal Handling of BSC


The internal handling of the BSC in the ciphering mode setting procedure is given below:
Step 1 Upon receipt of the CIPHER MODE COMMAND message from the MSC, the BSC checks
the classmark of the MS and setting for the Encryption algorithm field in the [Cell
configuration table].
Step 2 The BSC takes an intersection from the encryption algorithms supported in the CIPHER
MODE COMMAND message from the MSC, that defined in the [Cell configuration table]
and that specified in the CM SERVICE REQUEST message from the MS.
Step 3 The BSC selects an appropriate algorithm from the intersection in the reverse order of
algorithm priority. Note that the normal algorithm priority order (from high to low) is
described as A5/7 > A5/6 > A5/5 > A5/4 > A5/4 > A5/3 > A5/2 > A5/1 > A5/0. Then the
BSC sends a CIPHER MODE COMMAND message to the BTS.
----End

Issue 01 (2007-03-15)

Huawei Technologies Proprietary

10-3

M900/M1800 Base Station Subsystem


Signaling Analysis Manual

10 Ciphering Mode Setting Procedure

10.4 Abnormal Procedure


10.4.1 Ciphering Rejected
BSS shall return a Cipher Mode Reject message to MSC, indicating that the encryption
algorithm is not supported, if it does not support the encryption algorithm specified in the
Cipher Mode Command
A CIPHER MODE REJECT message shall also be returned if the MSC requests a change of
ciphering algorithm when BSS ciphering is already active.

10.4.2 MS Not Ciphered


In the following cases, Ciphering Mode Command messages shall be considered valid.
Step 1 MS in "not ciphered" mode receives a Ciphering Mode Command message, indicating "start
ciphering".
Step 2 MS in "not ciphered" mode receives a Ciphering Mode Command message, indicating "no
ciphering".
Step 3 MS in "ciphered" mode receives a Ciphering Mode Command message, indicating "no
ciphering".
In other cases (For example, in "ciphered" mode receives a Ciphering Mode Command
message, indicating "ciphering".), MS shall regard Ciphering Mode Command messages as
erroneous, return an RR Status message with the cause "Protocol error unspecified", and take
no further action.
----End

10-4

Huawei Technologies Proprietary

Issue 01 (2007-03-15)

Você também pode gostar