Signalling Data Integrity and Origin Authentication
- Integrity algorithm agreement: the mobile station and the serving network can securely negotiate the integrity algorithm that they use.
- Integrity key agreement: the mobile and the network agree on an integrity key that they may use subsequently; this provides entity authentication.
Read more about this topic: UMTS Security
Famous quotes containing the words data, integrity and/or origin:
“This city is neither a jungle nor the moon.... In long shot: a cosmic smudge, a conglomerate of bleeding energies. Close up, it is a fairly legible printed circuit, a transistorized labyrinth of beastly tracks, a data bank for asthmatic voice-prints.”
—Susan Sontag (b. 1933)
“A task becomes a duty from the moment you suspect it to be an essential part of that integrity which alone entitles a man to assume responsibility.”
—Dag Hammarskjöld (19051961)
“Our theism is the purification of the human mind. Man can paint, or make, or think nothing but man. He believes that the great material elements had their origin from his thought.”
—Ralph Waldo Emerson (18031882)