Air Interface Encryption

GPTKB entity

Statements (51)
Predicate Object
gptkbp:instanceOf Encryption Technology
gptkbp:compatibleWith Authentication
Integrity Protection (in GSM)
gptkbp:enables Confidentiality of Wireless Communication
gptkbp:encryptionEndPoint Base Station
gptkbp:encryptionScope Radio Interface Only
gptkbp:encryptionStartPoint Mobile Device
https://www.w3.org/2000/01/rdf-schema#label Air Interface Encryption
gptkbp:implementedIn gptkb:5G
gptkb:GSM
gptkb:UMTS
LTE
gptkbp:introducedIn gptkb:GSM
gptkbp:key CK (UMTS/LTE)
Kc (GSM)
Session Key
gptkbp:mitigatedBy Eavesdropping
Man-in-the-middle Attack
gptkbp:notProtect End-to-End Traffic
gptkbp:option Some Network Configurations
gptkbp:protectedBy Data Traffic
Signaling Traffic
Voice Traffic
gptkbp:provides Confidentiality
gptkbp:purpose Protect Data Over Radio Interface
gptkbp:relatedTo gptkb:gNodeB
gptkb:Base_Transceiver_Station_(BTS)
gptkb:Transport_Layer_Security
End-to-End Encryption
SIM Card
Authentication Center (AuC)
Evolved Node B (eNodeB)
gptkbp:requires gptkb:Mobile_Network_Operators
gptkbp:standardizedBy gptkb:3GPP
gptkb:ETSI
gptkbp:supportsAlgorithm gptkb:A5/1
gptkb:A5/2
gptkb:KASUMI
gptkb:SNOW_3G
A5/3
128-EEA1
128-EEA2
128-EEA3
gptkbp:usedIn gptkb:Wireless_Networks
gptkb:Mobile_Communications
Cellular Networks
gptkbp:vulnerableTo Cipher Downgrade Attacks
Key Reuse
Weak Algorithms (e.g., A5/1, A5/2)
gptkbp:bfsParent gptkb:TETRA
gptkbp:bfsLayer 5