What is ciphering in GSM?

GSM makes use of a ciphering key to protect both user data and signaling on the vulnerable air interface . Once the user is authenticated, the RAND (delivered from the network) together with the KI (from the SIM) is sent through the A8 ciphering key generating algorithm, to produce a ciphering key (KC).

Read more

How is user identity protected 5G?

In 5G, a subscriber long-term identity is always transmitted over the radio interfaces in an encrypted form. More specifically, a public key-based encryption is used to protect the SUPI . Therefore, only the SIDF has access to the private key associated with a public key distributed to UEs for encrypting their SUPIs.

Read more