There is a plethora of books available on 3G mobile technology in its entirety, but when it comes to the actual mechanics of the cryptographic algorithms involved the information is typically vague. If your interest is in the precise workings of 3G cryptography then this book is for you; it is perhaps the only book of its kind. Every single original algorithm of 3G User Equipment (3G mobile phones) is explained in explicit detail, and each is coupled with a thorough example. The algorithms include the standardised functions, UEA1 for confidentiality and UIA1 for integrity, along with Kasumi, the corresponding kernel algorithm, and also all the non-standardised algorithms for authentication and key agreement, along with their corresponding kernel algorithm, Rijndael (A.E.S.). Contained here is all the information required to literally pencil-and-paper all the cryptographic inputs to outputs of 3G mobiles…patience not included!
show more...Just click on START button on Telegram Bot