UMTS Security - User Traffic Confidentiality

User Traffic Confidentiality

  • Ciphering algorithm agreement: the mobile and the station can securely negotiate ciphering algorithm that they use.
  • Cipher key agreement: the mobile and the station agree on a cipher key that they may use.
  • Confidentiality of user and signalling data: neither user data nor sensitive signalling data can be overheard on the radio access interface.

Read more about this topic:  UMTS Security

Famous quotes containing the words user and/or traffic:

    A worker may be the hammer’s master, but the hammer still prevails. A tool knows exactly how it is meant to be handled, while the user of the tool can only have an approximate idea.
    Milan Kundera (b. 1929)

    There’s something about the dead silence of an office building at night. Not quite real. The traffic down below is something that didn’t have anything to do with me.
    John Paxton (1911–1985)