Rel-10 Security 2G Intermediate

TS 55.205 – GSM Authentication & Key Generation Example

Example algorithms for GSM authentication (A3) and key generation (A8), based on MILENAGE. Operator-specifiable functions.

Release
Rel-10
Category
Security
Subcategory
Authentication
Network Layer
Security
Technology
2G
Business Impact
Medium

Key Technologies

GSMUMTS

View the full specification with interactive table of contents, version history, and AI analysis.

Read Full Specification →