Statements (29)
Predicate | Object |
---|---|
gptkbp:instanceOf |
encryption algorithm family
|
gptkbp:A5/0 |
no encryption
|
gptkbp:A5/1 |
crypt
used in Europe key length 64 bits vulnerable to cryptanalysis |
gptkbp:A5/2 |
crypt
key length 64 bits used in export markets vulnerable to cryptanalysis |
gptkbp:A5/3 |
based on KASUMI cipher
key length 128 bits stronger security than A5/1 and A5/2 used in 3G networks |
gptkbp:A5/4 |
key length 128 bits
used in satellite phone systems |
gptkbp:deployment |
1990s
|
gptkbp:developedBy |
gptkb:ETSI
|
https://www.w3.org/2000/01/rdf-schema#label |
A5 encryption algorithms
|
gptkbp:includes |
gptkb:A5/1
gptkb:A5/2 A5/3 A5/0 A5/4 |
gptkbp:purpose |
data privacy
voice privacy |
gptkbp:usedIn |
gptkb:GSM_mobile_communications
|
gptkbp:bfsParent |
gptkb:GSM_networks
|
gptkbp:bfsLayer |
6
|