Abstract

Exploring adopted and implemented standards for the operation of CDMA2000. The focus is currently on functioning authentication algorithm CAVE (Cellular Authentification and Voice Encryption). This algorithm is used as a multi-functional not only during the authentication , but also to generate the key used for encrypting voice data service messages . CAVE - is a software-compatible nonlinear mixing function. If the operator does not use an element , A-Key (Authentication Key), as is the case with imposing a generation data network to the previous one, it greatly simplifies the construction and performance of clones zlovmy - snykamy . Since 2005, proposed a new system for authenticating AKA (Authentication and Key Agreement), which uses the hash function SHA- 1 and fully implemented in CDMA2000 Rev C.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call