You are on page 1of 1

Introduction to cryptography

- Two main groups: Symetric and Asymmetric


- Symetric = 1 key that just the sender and receiver knows. Key + Algorithm = Cypto message.
- Assymetric = 2 keys.
- Symmetric are more efficient.
- If yo can share key, it’s better to use symmetric.
- Authenticity is more crucial for asymmetric.
- There are block and stream cyphers.

- Block ciphers: DES (weak, use 3DES with proper keys instead), AES (Rijndael) (used in LTE, is
supposed to be secure, 3 variants)
- Based on the serial number of the SIM card + algorithm (SID)
- (Dkey) KIC = DES(MK, ICCID) – Key derivation
- And I keep the Master Key inside the KMS/HSM (Hardware security module)
- We have multiples MKs (one for each key).
- (Input Files) ICCIDs -> Perso applications (DP, EP), that consults KMS and generates -> IMA, SPA,
Output Fiel
- Derivação – Criptografia – Autentificação – Identidade CPC-KMS

GPD -> Electrical, Input File + Output file = Product matrix

You might also like