UMTS Security - User Traffic Confidentiality

User Traffic Confidentiality

  • Ciphering algorithm agreement: the mobile and the station can securely negotiate ciphering algorithm that they use.
  • Cipher key agreement: the mobile and the station agree on a cipher key that they may use.
  • Confidentiality of user and signalling data: neither user data nor sensitive signalling data can be overheard on the radio access interface.

Read more about this topic:  UMTS Security

Famous quotes containing the words user and/or traffic:

    A worker may be the hammer’s master, but the hammer still prevails. A tool knows exactly how it is meant to be handled, while the user of the tool can only have an approximate idea.
    Milan Kundera (b. 1929)

    Poems stirred
    into paper coffee-cups, eaten
    with petals on rye in the
    sun—the cold shadows in back,
    and the traffic grinding the
    borders of spring ...
    Denise Levertov (b. 1923)