Professional Documents
Culture Documents
Feature description
DN70645977
Issue 1-2
BSS20093: A5/3 ciphering
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This documentation is intended for the
use of Nokia Siemens Networks customers only for the purposes of the agreement under which
the document is submitted, and no part of it may be used, reproduced, modified or transmitted
in any form or means without the prior written permission of Nokia Siemens Networks. The
documentation has been prepared to be used by professional and properly trained personnel,
and the customer assumes full responsibility when using it. Nokia Siemens Networks welcomes
customer comments as part of the process of continuous development and improvement of the
documentation.
The information or statements given in this documentation concerning the suitability, capacity,
or performance of the mentioned hardware or software products are given "as is" and all liability
arising in connection with such hardware or software products shall be defined conclusively and
finally in a separate agreement between Nokia Siemens Networks and the customer. However,
Nokia Siemens Networks has made all reasonable efforts to ensure that the instructions
contained in the document are adequate and free of material errors and omissions. Nokia
Siemens Networks will, if deemed necessary by Nokia Siemens Networks, explain issues which
may not be covered by the document.
Nokia Siemens Networks will correct errors in this documentation as soon as possible. IN NO
EVENT WILL Nokia Siemens Networks BE LIABLE FOR ERRORS IN THIS DOCUMENTA-
TION OR FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDI-
RECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED
TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY
OR DATA,THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION
IN IT.
This documentation and the product it describes are considered protected by copyrights and
other intellectual property rights according to the applicable laws.
The wave logo is a trademark of Nokia Siemens Networks Oy. Nokia is a registered trademark
of Nokia Corporation. Siemens is a registered trademark of Siemens AG.
Other product names mentioned in this document may be trademarks of their respective
owners, and they are mentioned for identification purposes only.
Copyright © Nokia Siemens Networks 2009. All rights reserved
2 Id:0900d805806451aa
DN70645977 Issue 1-2
BSS20093: A5/3 ciphering
Table of Contents
This document has 15 pages.
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1 In general. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2 Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.1 End user benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.2 Operator benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1 Software requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Hardware requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3 Functional description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.1 Functional overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.2 Ciphering algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4 System impacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5 User interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.1 Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.2 Parameter evolution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.3 System responses to failures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.4 Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.5 Measurements and counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Id:0900d805806451aa 3
DN70645977 Issue 1-2
BSS20093: A5/3 ciphering
List of Figures
Figure 1 Ciphering and deciphering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4 Id:0900d805806451aa
DN70645977 Issue 1-2
BSS20093: A5/3 ciphering
List of Tables
Table 1 BTS software support of A5 ciphering modes . . . . . . . . . . . . . . . . . . . . . 8
Table 2 Selection of A5 algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Table 3 Error description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Id:0900d805806451aa 5
DN70645977 Issue 1-2
Reason for update BSS20093: A5/3 ciphering
Issue history
Details
6 Id:0900d805805f1c7d
DN70645977 Issue 1-2
BSS20093: A5/3 ciphering Introduction
1 Introduction
1.1 In general
For CS calls and SMSs, the A5/3 ciphering code provides more secure air interface links
to prevent hacking attacks than A5/1 encryption. Therefore, A5/3 encoding shall be
deployed if possible, as defined by the “A5/3 ciphering” feature (BSS20093). Otherwise,
the A5/1 algorithm can be used, which is supported by all BTS and MS types.
Maximum encryption is selected by the BSC in the call setup phase. This algorithm will
be changed to the less complex one only if the target TRX is not capable of supporting it.
According to 3GPP GERAN standardization, the A5/2 cipher mode (which is less secure
than A5/1) is not allowed to be supported in MSs for further releases. If non-encryption
is permitted, A5/0 can be deployed. The set of usable ciphering algorithms is then {A5/0,
A5/1, A5/3}, where the 3GPP standardization ciphering method A5/3 is the most secure
one. First, application of this algorithm will be tried. If a ciphering mode cannot be estab-
lished, a less secure one will be applied.
Ciphering is performed by the BTS. The BSC selects the ciphering algorithm based on
information received from the MSC and information about allowed and supported algo-
rithms in the BSS and the MS.
1.2 Benefits
The ciphering algorithm A5/3 provides more secure air interface links than A5/1 encryp-
tion. If the network capabilities are sufficient, A5/3 encryption shall be deployed. Intro-
duction of A5/3 mode provides an adequate level of security against hacking attacks.
Nevertheless, the A5/1 algorithm can be used as fallback solution.
Id:0900d8058021f512 7
DN70645977 Issue 1-2
Requirements BSS20093: A5/3 ciphering
2 Requirements
The A5/3 ciphering algorithm can be used for voice calls and SMSs if both the MS and
the BSS support this encryption.
During handovers, the ciphering mode changes from A5/3 to A5/1 coding and, if non-
encryption is permitted, it is even possible to change from A5/3 to A5/0 and from A5/1
to A5/0. If ciphering mode change is not possible, then the required handover is not exe-
cuted.
The BSS is also capable of changing ciphering modes for DTM intracell HOs. For DTM,
a release 7 MS is required to support ciphering mode change during DTM assignment.
BTS
The new ciphering software package has to be installed if BTS hardware requirements
are fulfilled.
BTS software support can be checked by the following mapping:
A interface
• Ciphering mode change requires usage of cipher mode IE for handover command
messages.
• The selected encryption algorithm IE is used for the following messages to the MSC:
“Handover performed”, “Cipher mode complete”, and “Handover request acknowl-
edge”.
Air interface
• Ciphering mode change requires usage of cipher mode IE for handover command
messages.
• Cipher mode IE is used for the “assignment command message” and the “DTM
assignment command message” for intracell handovers.
8 Id:0900d80580621c22
DN70645977 Issue 1-2
BSS20093: A5/3 ciphering Requirements
Id:0900d80580621c22 9
DN70645977 Issue 1-2
Functional description BSS20093: A5/3 ciphering
3 Functional description
The “A5/3 ciphering” feature improves ciphering by implementing the A5/3 algorithm.
This chapter is divided into the following sections:
• “Functional overview”
• “Ciphering algorithm”
For general information on the ciphering procedure, refer to “Ciphering procedure”.
10 Id:0900d80580621cb3
DN70645977 Issue 1-2
BSS20093: A5/3 ciphering Functional description
#/5.4 $)2%#4)/.
,%.'4(
+C #IPHERING !LGORITHM
+%9342%!-
",/#+
0,!).4%84 #)0(%24%84
",/#+ ",/#+
3ENDER
-3 OR "33
Count
Enciphering and deciphering are synchronized by steering the A5 algorithm using the
explicit time variable “Count”. This “Count” parameter is derived from the TDMA frame
number, expressed as a block of 22 bits.
Id:0900d80580621cb3 11
DN70645977 Issue 1-2
System impacts BSS20093: A5/3 ciphering
4 System impacts
In this chapter, dependencies on other features of the BSS are considered.
DTM call
Sometimes DTM call intracell handovers require ciphering mode change. Cipher mode
IE is used for this purpose in DTM assignment messages. If the MS does not support
this IE, intracell handover with ciphering mode change cannot be used. Evidently, A5/3
encoding for the corresponding handovers has to be supported.
A5/1 ciphering
A5/3 ciphering is used instead of the weaker A5/1 encoding if the BTS supports A5/3
ciphering and if this encoding is enabled in the BSC and the MSC.
FACCH call
A5/3 ciphering for FACCH calls is possible.
12 Id:0900d80580258de7
DN70645977 Issue 1-2
BSS20093: A5/3 ciphering User interface
5 User interface
This chapter is divided into the following sections:
• “Parameters”
• “Parameter evolution”
• “System responses to failures”
• “Alarms”
• “Measurements and counters”
5.1 Parameters
Configuration management provides parameters in order to select allowed A5 algo-
rithms with regard to the BSC:
Parameter Values
ALLOWED_A5_ALGORITHMS A5/0, A5/1
The on/off license defines whether the A5/3 algorithm is permitted in the BSC.
Error Description
ciph_not_support_trx_c Number of failed ciphering algorithm selections
due to incompatible ciphering algorithm support
5.4 Alarms
No alarms are related to this feature.
Id:0900d80580621ccb 13
DN70645977 Issue 1-2
Activating and configuring the feature BSS20093: A5/3 ciphering
1 Check that the license or licenses for the “A5/3 ciphering” feature are installed
For an overview of licensing procedures, see “Licensing in BSC” and “W7 License and
Feature Handling”.
ZW7I: LIC,FULL:LIC=<licence code>;
3 End
14 Id:0900d80580621cba
DN70645977 Issue 1-2
BSS20093: A5/3 ciphering Activating and configuring the feature
2 End
Id:0900d80580621cba 15
DN70645977 Issue 1-2