gptkbp:instanceOf
|
Encryption Technology
|
gptkbp:compatibleWith
|
Authentication
Integrity Protection (in GSM)
|
gptkbp:enables
|
Confidentiality of Wireless Communication
|
gptkbp:encryptionEndPoint
|
Base Station
|
gptkbp:encryptionScope
|
Radio Interface Only
|
gptkbp:encryptionStartPoint
|
Mobile Device
|
https://www.w3.org/2000/01/rdf-schema#label
|
Air Interface Encryption
|
gptkbp:implementedIn
|
gptkb:5G
gptkb:GSM
gptkb:UMTS
LTE
|
gptkbp:introducedIn
|
gptkb:GSM
|
gptkbp:key
|
CK (UMTS/LTE)
Kc (GSM)
Session Key
|
gptkbp:mitigatedBy
|
Eavesdropping
Man-in-the-middle Attack
|
gptkbp:notProtect
|
End-to-End Traffic
|
gptkbp:option
|
Some Network Configurations
|
gptkbp:protectedBy
|
Data Traffic
Signaling Traffic
Voice Traffic
|
gptkbp:provides
|
Confidentiality
|
gptkbp:purpose
|
Protect Data Over Radio Interface
|
gptkbp:relatedTo
|
gptkb:gNodeB
gptkb:Base_Transceiver_Station_(BTS)
gptkb:Transport_Layer_Security
End-to-End Encryption
SIM Card
Authentication Center (AuC)
Evolved Node B (eNodeB)
|
gptkbp:requires
|
gptkb:Mobile_Network_Operators
|
gptkbp:standardizedBy
|
gptkb:3GPP
gptkb:ETSI
|
gptkbp:supportsAlgorithm
|
gptkb:A5/1
gptkb:A5/2
gptkb:KASUMI
gptkb:SNOW_3G
A5/3
128-EEA1
128-EEA2
128-EEA3
|
gptkbp:usedIn
|
gptkb:Wireless_Networks
gptkb:Mobile_Communications
Cellular Networks
|
gptkbp:vulnerableTo
|
Cipher Downgrade Attacks
Key Reuse
Weak Algorithms (e.g., A5/1, A5/2)
|
gptkbp:bfsParent
|
gptkb:TETRA
|
gptkbp:bfsLayer
|
5
|