Documente Academic
Documente Profesional
Documente Cultură
Contents
7 Ciphering Procedure..................................................................................................................7-1
7.1 Overview of Ciphering..................................................................................................................................7-2
7.2 Ciphering Procedure......................................................................................................................................7-2
7.2.1 Signaling Procedure .............................................................................................................................7-2
7.2.2 Description of the Procedure................................................................................................................7-3
7.3 Changing the Ciphering Mode ......................................................................................................................7-3
7.4 Signaling Procedure in the BSC....................................................................................................................7-4
7.5 Abnormal Cases and Troubleshooting...........................................................................................................7-4
7.5.1 Ciphering Rejected...............................................................................................................................7-4
7.5.2 MS Not Ciphering................................................................................................................................7-5
Figures
7 Ciphering Procedure
Generally, the ciphering takes place at the service requests, such as location updating, service
access, and inter-BSC handover. The ciphering requires the support of the GSM network
equipment, especially the BTS, and also depends on the encryption support capacity of the
MS.
The following table lists the contents of this chapter.
Section Describes
Ciphering Mode
Encryption Mode Command(1)
Ciphering Mode Command(2)
Command(3)
SDCCH
Ciphering Mode
Complete(4)
Ciphering Mode
SDCCH
Complete(5)
In the ciphering mode setting procedure, the MSC sends a Cipher Mode Command message
to the BSC. The message contains the required ciphering algorithm, the ciphering key Kc
(including the requirement for deciphering), and the information about whether an MS is
required to contain an international mobile subscriber identity (IMSI) in a Cipher Mode
Complete message. :
According to the ciphering algorithm in the Cipher Mode Command sent by the MSC, the
ciphering algorithm allowed by the BSC, and the ciphering algorithm supported by the MS,
the BSC determines which algorithm is used, and then the BSC sends the decision to the BTS.
The BTS sends the Cipher Mode Command message to the MS to inform the MS of the
chosen ciphering algorithm.
Upon receipt of the Cipher Mode Complete message, the MS starts to send the ciphering
mode, and then the MS responds with a Cipher Mode Complete message to the BSS.
Upon receipt of the Cipher Mode Complete message from the MS, the BSC informs the MSC
of the completion of the ciphering.
----End
The BTS completes and manages the ciphering, not the BSC. The completion of ciphering
requires the configuration of the BTS and the configuration of the MS. In fact, the ciphering
mode made by the MSC changes the command and the BTS completes the operation. :
Probable Causes
The abnormal procedure is caused by the following causes:
z When the BSS does not support the ciphering algorithm indicated in the Cipher Mode
Command message, the BSS responds with a Cipher Mode Reject message to the MSC
with the cause "ciphering algorithm not supported." :
z When the MSC requires changing the ciphering algorithm, the BSS starts ciphering.
Then the BSS should respond with a Cipher Mode Reject message to the MSC.
Troubleshooting
z Cause (1)
Check whether the ciphering algorithm indicated in the Cipher Mode Command message
is supported on the BSS side.
z Cause (2)
Check whether the BSS starts ciphering.
Probable Causes
A valid Ciphering Mode Command message is defined to be one of the following:
z One that indicates "start ciphering" and is received by the MS in the "not ciphered" mode
z One that indicates "no ciphering" and is received by the MS in the "not ciphered" mode
z One that indicates "no ciphering" and is received by the MS in the "ciphered" mode
Other Ciphering Mode Command messages shall be regarded as erroneous. For example, the
message that indicates "start ciphering" and is received by the MS in the "ciphered" mode. An
RR Status message with a cause "Protocol error unspecified" shall be returned by the MS. No
further action is taken.
Troubleshooting
Check the mode that the MS is in and the Ciphering Mode Command message.