GSM Security


Warning: Undefined variable $theme_options in /home/gsm-sec/web/gsm-security.net/public_html/wp-content/themes/freshblog/header.php on line 75

Warning: Trying to access array offset on value of type null in /home/gsm-sec/web/gsm-security.net/public_html/wp-content/themes/freshblog/header.php on line 75

GSM Security Glossary

A3 Authentication Algorithm
A5 Ciphering Algorithm
A8 Ciphering Key Generating Algorithm
ADMF Administrative Function
AoC Advice of Charge
AUC Authentication Center
AKA Authentication and Key Agreement
AN Access Network
BSC Base Station Controller
BSS Base Station System
BSSAP Base Station Subsystem Application Part
BTS Base Tranceiver Station
CAMEL Customized Application for Mobile Enhanced Logic
CBC Cipher Block Chaining
CC Content of Communication
CCBS Customer Care and Billing System
CDMA CDMA Division Multiple Access
CDR Call Data Record
CEIR Central Equipment Identity Register
CEPT European Conference of Post and Telecommunication Administrations
CFB Cipher Feedback
CGI Cell Global Identity
CKSN Cipher Key Sequence Number
CMEA Cellular Message Encryption Algorithm
CUG Closed User Group
DIMSI Dual International Mobile Subscriber Identity
DES Data Encryption Standard
DSA Digital Signature Algorithm
ECB Electronic Code Book
EIR Equipment Identity Register
EDGE Enhanced Data GSM Environment
EIR Equipment Identity Register
EMS Enhanced Messaging Service
ETSI European Telecommunications Standards Institute
GERAN GSM EDGE Radio Access Network
GIWU GSM Interworking Unit
GMSC Gateway Mobile Services Switching Center
GMSK Gaussian Minimum Shift Keying
GPRS General Packet Radio System
GSM Global System for Mobile communication
GTT Global Title Translation
HCSD High-Speed Circuit-Switched Data
HE Home Environment
HLR Home Location Register
IMEI International Mobile Equipment Identifier
IMSI International Mobile Subscriber Identity
IN Intelligent Network
INAP Intelligent Network Application Part
IRI Intercept Related Information
ISAAC Internet Security, Applications, Authentication and Cryptography group at the University of California, Berkeley
Kc Ciphering Key
Ki Individual Subscriber Authentication Key
LA Location Area
LAI Location Area Identity
LEA Law Enforcement Agency
LFSR Linear Feedback Shift Register
LI Lawful Interception
LPC Linear Predictive Coding
MAP Mobile Application Part
MML Man-Machine Language
MMS Mobile Multimedia Services
MNC Mobile Network Code
MoU Memorandum of Understanding
MSC Mobile Services Switching Center
MS Mobile Station
MSE Mobile Station Equipment
MSIN Mobile Subscriber Identity Number
MSISDN Mobile Subscriber ISDN
MSN Mobile Service Node
MSRN Mobile Station Roaming Number
MTP Message Transfer Part
MXE Message Center
MExE Mobile Execution Environment
NIST National Institute of Standards and Technology
NSS Network and Switching Subsystem
OMC Operations and Maintenance Center
OSS Operation and Support System
OTA Over The Air
PCS Personal Communications Service
PDP Packet Data Protocol
PKCS Public Key Cryptography System
PLMN Public Land Mobile Network
PSTN Public Switched Telephone Network
RFM Remote Files Management
RSA Rivest, Shamir, Adleman
SAGE Security Algorithms Group of Experts
SAS Security Accreditation Scheme
SCI Subscriber Controlled Input
SHA Secure Hash Algorithm
SIM Subscriber Identification Module
SMS Short Message Service
SMSC Short Message Service Center
SN Serving Network
SO Service Order
SRES Signed Response
SS Switching System
SS7 Signaling System 7
TCAP Transaction Capabilities Application Part
TDMA Time Division Multiple Access
TMSI Temporary Mobile Subscriber Identity
UMTS Universal Mobile Telecommunications Service
USIM User Services Identity Module
VLR Visitor Location Register
VMS Voice Mail Service / Voice Messaging Service
WAP Wireless Application Protocol