GBSS18.1
Issue 02
Date 2017-01-16
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Contents
2 Overview......................................................................................................................................... 3
2.1 Introduction.................................................................................................................................................................... 3
2.2 NEs Supporting the Feature............................................................................................................................................4
3 Kc Generation.................................................................................................................................5
4 A5 Ciphering Algorithm.............................................................................................................. 7
5 Algorithm Selection...................................................................................................................... 9
6 Signaling for Ciphering Procedure.......................................................................................... 11
7 Enhancements to the A5 Ciphering Algorithm..................................................................... 13
8 Impact on KPI...............................................................................................................................15
9 Related Features...........................................................................................................................17
9.1 GBFD-113501 A5/1 and A5/2 Ciphering Algorithm................................................................................................... 17
9.2 GBFD-113503 A5/3 Ciphering Algorithm...................................................................................................................17
9.3 GBFD-113521 A5/1 Encryption Flow Optimization................................................................................................... 18
9.4 GBFD-181205 A5/4 Ciphering Algorithm...................................................................................................................18
10 Engineering Guidelines........................................................................................................... 19
10.1 Deploying Ciphering.................................................................................................................................................. 19
10.1.1 Deployment Requirements...................................................................................................................................... 19
10.1.2 Activation................................................................................................................................................................ 20
10.1.3 Activation Observation............................................................................................................................................22
10.1.4 Deactivation.............................................................................................................................................................23
10.2 Deploying A5/1 Encryption Flow Optimization........................................................................................................ 24
10.2.1 Deployment Requirements...................................................................................................................................... 24
10.2.2 Activation................................................................................................................................................................ 24
10.2.3 Activation Observation............................................................................................................................................28
10.2.4 Deactivation.............................................................................................................................................................29
11 Parameters................................................................................................................................... 33
12 Counters...................................................................................................................................... 51
13 Glossary....................................................................................................................................... 53
14 Reference Documents............................................................................................................... 54
1.1 Scope
This document describes Ciphering, including its technical principles, related features, and
engineering guidelines.
This document covers the following features:
l GBFD-113501 A5/1 and A5/2 Ciphering Algorithm
l GBFD-113503 A5/3 Ciphering Algorithm
l GBFD-113521 A5/1 Encryption Flow Optimization
l GBFD-181205 A5/4 Ciphering Algorithm
02 (2017-01-16)
This issue includes the following changes.
01 (2016-02-29)
This issue includes the following changes.
Feature change Added the A5/4 ciphering algorithm. For details, CipherKeyChang
see: eAllow (BSC6900,
l 2 Overview BSC6910)
l 3 Kc Generation
l 4 A5 Ciphering Algorithm
l 5 Algorithm Selection
l 9 Related Features
l 10.1.1 Deployment Requirements
l 14 Reference Documents
Added the following counters to measure the
performance of the A5/4 ciphering algorithm:
l CELL.SPT.CIPHER.CMD.A5.4
l CELL.SPT.CIPHER.SUCC.A5.4
Draft A (2015-12-31)
Compared with Issue 01 (2015-06-27) of GBSS17.1, Draft A (2015-12-31) of GBSS18.1
includes the following changes.
2 Overview
2.1 Introduction
The ciphering procedure is initiated on the network side. The BTS and MS cipher and
decipher information using the A5 algorithm and the ciphering key (Kc) that is generated by
the ciphering algorithm based on capabilities of the MS, BSS, and MSC. This processing
ensures the security of the information on the Um interface. The A5/1, A5/2, and A5/3
ciphering algorithms use the A8 algorithm to generate the Kc, and the A5/4 ciphering
algorithm uses the HMAC-SHA-256 algorithm to generate the 128-bit Kc.
The MS and network side use the same Ki and random number. They use the same ciphering
algorithm to generate the Kc values.
Huawei GBSS supports A5/1, A5/2, A5/3, and A5/4 ciphering algorithms. It is recommended
that the same ciphering algorithm be used on the entire network. This prevents handover
failures between ciphering areas and non-ciphering areas due to the MS compatibility issues.
A network operator can use the A5 ciphering algorithm only after being granted by the 3GPP
Organizational Partners. As A5/1 and A5/2 ciphering algorithms have been decoded, it is
advisable that you use the more secure A5/3 ciphering algorithm or the A5/1 ciphering
algorithm with A5/1 Encryption Flow Optimization enabled.
Select ciphering algorithms according to the capabilities of the network and MSs. The
ciphering algorithms to be adopted must be allowed in ciphering commands delivered by the
MSC and in the BSC data configuration, and supported by the MSs. The BSC selects
ciphering algorithms based on the priorities of the algorithms. If the BSS does not support the
ciphering algorithms allowed in ciphering commands delivered by the MSC, it rejects the
implementation of the ciphering procedure.
To addresses the relatively weak data security of the A5 ciphering algorithm, the Ciphering
feature optimizes the ciphering procedure based on the characteristics of the Um interface
transmission on a GSM network. The feature enhances transmission security and provides
better protection against eavesdropping.
NOTE
√ indicates that the NE supports this feature. × indicates that the NE does not support this feature.
3 Kc Generation
This section describes the generation of the ciphering key (Kc), which is used to encrypt user
data. The A5/1, A5/2, and A5/3 ciphering algorithms use the 64-bit Kc, and the A5/4
ciphering algorithm uses the 128-bit Kc.
The MS and the network use the same Kc to cipher and decipher user data.
An MS is allocated an International Mobile Station Identity (IMSI) and Ki after it is
registered in the GSM network. The MS and the network store the same Ki and RAND for
authentication. The RAND is generated by the network and sent to the MS. Both the network
and the MS use the A8 algorithm to generate the ciphering key Kc. Figure 3-1 shows the
generation of the 64-bit Kc.
Unlike the A5/1, A5/2, and A5/3 ciphering algorithms which use the 64-bit Kc, the A5/4
ciphering algorithm uses the 128-bit Kc and the Kc is generated in a way different from that
of generating the Kc for other ciphering algorithm. The network side and MS generate the
128-bit Kc only when the UMTS Authentication and Key Agreement (AKA) procedure is
complete. Figure 3-2 shows the generation of the 128-bit Kc.
4 A5 Ciphering Algorithm
This section describes the A5 ciphering algorithm, which includes GBFD-113501 A5/1 and
A5/2 Ciphering Algorithm ,GBFD-113503 A5/3 Ciphering Algorithm, and GBFD-181205
A5/4 Ciphering Algorithm. The A5 ciphering algorithm is used to generate a pseudo-random
sequence.
Based on the 64-bit or 128-bit Kc stored in the MS and the network and the 22-bit Link
Logical Control (LLC) frame number of the current pulse stream, the A5 ciphering algorithm
generates a 114-bit ciphering sequence or a 114-bit deciphering sequence. The A5 algorithm
ciphers or deciphers data by performing the Exclusive OR (XOR) operation between the
ciphering/deciphering sequence and the information bit in the data (ciphered or not ciphered).
The network uses the same ciphering sequence in the uplink and downlink. For each burst,
one sequence is used for MS ciphering and BTS deciphering while the other is used for BTS
ciphering and MS deciphering.
The ciphering or deciphering on the radio links is performed by the BTS and MS. Figure 4-1
shows the ciphering/deciphering process.
5 Algorithm Selection
The ciphering algorithms are selected based on the capabilities of the network, BSS, and MS.
The ciphering algorithm supported by the BSS side is specified by the parameter ENCRY
(BSC6900, BSC6910).
The process of selecting the ciphering algorithms is as follows:
1. In the call access procedure, the MS sends an Establish Indication message to the BSC.
– If the parameter ECSC (BSC6900, BSC6910) in the system information is set to
No, the MS reports Classmark 1 or Classmark 2 to the BSC to indicate support for
the A5/1, A5/2, and A5/3 ciphering algorithms.
– If the parameter ECSC (BSC6900, BSC6910) in the system information is set to
Yes, the MS reports Classmark 1, Classmark 2, and Classmark 3 to the BSC to
indicate support for the A5/1, A5/2, A5/3, A5/4, A5/5, A5/6, and A5/7 ciphering
algorithms.
2. Upon receiving the Cipher Mode Command message from the MSC, the BSC checks
whether it has received Classmark 2 from the MS when the A5/3 or A5/4 ciphering
algorithm is supported.
If the BSC has not received Classmark 2, it starts a timer waiting for Classmark 2 when
CipherCmdWaitCMTimer (BSC6900, BSC6910), which specifies the timer, is set to a
value other than 0. In this case, if the BSC has received Classmark 2 before the timer
expires, it stops the timer and selects ciphering algorithms based on the MS capability; if
the BSC has not received Classmark 2 when the timer expires, it selects ciphering
algorithms based on the current MS capability information. If CipherCmdWaitCMTimer
(BSC6900, BSC6910) is set to 0, the BSC performs ciphering without waiting for
Classmark 2.
NOTE
To set CipherCmdWaitCMTimer (BSC6900, BSC6910) to a value other than 0, you need to set
ECSC (BSC6900, BSC6910) to YES(Yes) in advance. This ensures that MSs can report
Classmark messages properly.
l The default priorities of ciphering algorithms are A5/7 to A5/0, in descending order.
l For some MSs to be handed over from WCDMA cells to GSM cells, if the MSs are not enabled with
Ciphering in WCDMA cells, they cannot be enabled with Ciphering after being handed over to GSM
cells. To avoid MS handover failures in this situation, set HOCipherSw (BSC6900, BSC6910) and
JudgeRNCCipherState (BSC6900, BSC6910) to appropriate values.
NOTICE
l If the BSS does not support the ciphering algorithms specified in the Cipher Mode
Command message from the MSC, it sends the MSC a Ciphering Mode Reject message
with cause value "Ciphering Algorithms Not Supported".
l If the MSC requests to change the ciphering algorithms but the BSS has enabled the
former ciphering algorithms, the BSS sends a Ciphering Mode Reject message to the
MSC.
l If the ciphering algorithms supported by the MSC, allowed in the BSC data configuration,
and supported by the MS are different, determine whether two MSs communicate with
each other in non-encryption mode based on the setting of the ENCRY_OPT_SWITCH
(BSC6900, BSC6910) parameter.
l If the A5/4 ciphering algorithm is enabled in a cell, you are advised to enable this
algorithm in its neighboring cells.
This section describes the signaling procedure for ciphering. The ciphering procedure is
generally triggered by location updates, service access, or inter-BSC handovers. To complete
the ciphering procedure, the BSC and MSC must be configured with ciphering algorithms and
the BTS and MS must have the codec capabilities associated with the ciphering algorithms.
Whether ciphering algorithms are used in the radio telecommunications system depends on
the entity that manages radio resources. Figure 6-1 shows the ciphering procedure, which is
initiated by the network and executed by the BTS.
1. Upon receiving a valid Ciphering Mode Command message, the MS loads the Kc stored
in the SIM card. If the MS receives an invalid Ciphering Mode Command message, it
considers the message to be erroneous. In this case, the MS sends an RR Status message
with cause value "Protocol Error" and does not take any action.
A valid Ciphering Mode Command message can be one of the following:
– One that indicates "start ciphering" and is received by the MS in "not ciphered"
mode.
– One that indicates "no ciphering" and is received by the MS in "not ciphered"
mode.
– One that indicates "no ciphering" and is received by the MS in "ciphered" mode.
2. After the MS receives the Ciphering Mode Command message and completes the
ciphering, it starts to send and receive messages in ciphered mode.
– If the MS has started the operations specified in the Ciphering Mode Command
message, it sends a Ciphering Mode Complete message to the network.
– If the "cipher response" field in the Ciphering Mode Command message is
"IMEISV request", the MS includes its IMEI in the Ciphering Mode Complete
message.
3. Upon receiving the Ciphering Mode Complete message from the MS, the network starts
information transmission in ciphered mode.
This section describes the enhancements to the A5 ciphering algorithm for better security. The
ciphering procedure is optimized based on the characteristics of the Um interface transmission
in GSM. The optimization enhances transmission security and provides better protection
against eavesdropping. (GBFD-113521 A5/1 Encryption Flow Optimization)
l Quick SDCCH handover is adopted in the MS access process, thereby making it more
difficult to track a call.
In a quick SDCCH handover, the BTS initiates an intra-cell SDCCH handover
immediately after sending the ciphering command to the MS. The subsequent ciphered
signaling can be transmitted and received on a new SDCCH. SDFASTHOSWITCH
(BSC6900, BSC6910) specifies whether quick SDCCH handover is enabled. To avoid
incompatibility with the MS, the BSC sends the handover command after receiving the
ciphering complete message from the MS.
l The timing TCH handover is introduced to make it more difficult to track a call.
Intra-cell handovers are performed at a specified time for speech calls.
TCHTIMEHOSWITCH (BSC6900, BSC6910) specifies whether the timing TCH
handover is enabled. If TCHTIMEHOSWITCH (BSC6900, BSC6910) is set to
ON(On), the handover timer is started and the length of the timer is
TCHTIMEHOPERIOD (BSC6900, BSC6910). When TCHTIMEHOPERIOD
(BSC6900, BSC6910) expires, an intra-cell forced handover is performed.
l The Hopping Sequence Number (HSN) in the Flex Training Sequence Code (TSC) and
Flex Mobile Allocation Index Offset (MAIO) differentiates TCHs in a cell, making it
difficult for an intruder to track other TCHs according to the characteristics of a certain
TCH.
The parameter FLEXTSCSWITCH (BSC6900, BSC6910) enables or disables the Flex
TSC function. If FLEXTSCSWITCH (BSC6900, BSC6910) is set to ON(On), channels
participate in frequency hopping and each channel is randomly assigned a TSC, ranging
from 0 to 7.
For details about Flex MAIO, see Flex MAIO Feature Parameter Description.
l After sending the Ciphering Mode Command message to the MS, the BTS stops sending
system information 5, 5bis, and 5ter over the SACCH on the SDCCH.
8 Impact on KPI
9 Related Features
Impacted Features
None.
Impacted Features
None.
Impacted Features
None.
Impacted Features
Feature ID Feature Name Description
GBFD-510301 Public Voice Group Call This feature does not take effect if
Service either of the following features is
enabled:
GBFD-510302 Public Voice Broadcast
Service l GBFD-510301 Public Voice Group
Call Service
l GBFD-510302 Public Voice
Broadcast Service
10 Engineering Guidelines
BSC None
BTS 3900 series base stations support the A5/4 ciphering algorithm only in
non-baseband extension mode.
The RRU3004, DRFU, RRU3008 V1, RRU3908 V1, GRFU V1,
MRFU V1, AAU3902, and RXU06 RF modules of 3900 series base
stations do not support the A5/4 ciphering algorithm.
Aspect Requirement
Others None
10.1.2 Activation
Step 1 Run the SET BSCBASIC command with A Interface Tag, Um Interface Tag, and Abis
Interface Tag set to GSM_PHASE_2Plus.
Step 2 Run the SET GCELLBASICPARA command with Encryption Algorithm set to A5/0 and
A5/3.
NOTE
l This procedure uses the A5/3 ciphering algorithm as an example. The configuration procedures of
other ciphering algorithms are the same as this procedure.
l A5/0 must be selected in Encryption Algorithm of basic cell parameters.
Step 3 (Optional) Run the SET GCELLBASICPARA command to set the ciphering algorithm
priorities. In this step, set Encryption Algorithm 1 through Encryption Algorithm 7 as
follows:
l Set Encryption Algorithm 1 to A51(A5/1).
l Set Encryption Algorithm 2 to A52(A5/2).
l Set Encryption Algorithm 3 to A53(A5/3).
l Set Encryption Algorithm 4 to A54(A5/4).
l Set Encryption Algorithm 5 to A55(A5/5).
l Set Encryption Algorithm 6 to A56(A5/6).
l Set Encryption Algorithm 7 to A57(A5/7).
NOTE
l The default priorities of ciphering algorithms are A5/7 to A5/0, in descending order. If no priorities are
configured for ciphering algorithms, the default priorities apply.
l Each priority corresponds to an encryption algorithm, and different priorities cannot correspond to the
same ciphering algorithm.
----End
When configuring the Ciphering feature on the CME, you must perform a single configuration first, and
then perform batch modifications if required.
You must perform a single configuration for a parameter before batch modifications of the parameter.
You are advised to perform batch modifications before logging out of the parameter setting interface.
To modify objects, such as BSCs, BTSs, cells, and TRXs, in batches, click the icon on the
CME configuration interface to start the batch modification wizard. For the method of
performing batch modifications through the CME batch modification center, press F1 on the
wizard interface to obtain online help.
----End
BSC6900/ Um UmVer
BSC6910 Interface
Tag
Step 1 On the BSC LMT, run the SET BSCBASIC command with A Interface Tag, Um Interface
Tag, and Abis Interface Tag set to GSM_PHASE_2Plus.
Step 2 Run the SET GCELLBASICPARA command with Cell Index set to the index of the test
cell and Encryption Algorithm set to A5/0 and A5/3.
Step 3 On the BSC LMT, double-click A Interface Trace to create a trace task. On the Basic tab,
specify the DPC of the test cell in the DPC(HEX) text box and select BSSAP in the Trace
Type area. Specify the ID of the test cell in the Cell ID (cell1, cell2, ...cell16): text box on the
BSSAP tab page. Then, click Submit.
Step 4 After the A Interface Trace window is displayed, use an MS to initiate a call in the test cell.
Expected result: The call is set up, and the chosen-encryption-algorithm IE in the Cipher
Mode Complete message is gsm-a5-3.
----End
10.1.4 Deactivation
When configuring the A5/3 Ciphering Algorithm feature on the CME, you must perform a single
configuration first, and then perform batch modifications if required.
You must perform a single configuration for a parameter before batch modifications of the parameter.
You are advised to perform batch modifications before logging out of the parameter setting interface.
Set parameters on the CME configuration interface according to the operation sequence
described in Table 10-3. For the method of performing the CME single configuration, see
CME Single Configuration Operation Guide.
Step 2 (Optional) Modify objects in batches on the CME. (CME batch modification center)
To modify objects, such as BSCs, BTSs, cells, and TRXs, in batches, click the icon on the
CME configuration interface to start the batch modification wizard. For the method of
performing batch modifications through the CME batch modification center, press F1 on the
wizard interface to obtain online help.
----End
BSC None
BTS None
License The license controlling this feature has been activated. For details on
how to activate the license, see License Management Feature
Parameter Description. For details about license items, see License
Control Item Description.
10.2.2 Activation
//Activating the function of stopping sending system information 5, 5bis, and 5ter after
encryption
When configuring the A5/1 Encryption Flow Optimization feature on the CME, you must perform a
single configuration first, and then perform batch modifications if required.
You must perform a single configuration for a parameter before batch modifications of the parameter.
You are advised to perform batch modifications before logging out of the parameter setting interface.
Set parameters on the CME configuration interface according to the operation sequence
described in Table 10-5 through Table 10-10. For the method of performing the CME single
configuration, see CME Single Configuration Operation Guide.
Step 2 (Optional) Modify objects in batches on the CME. (CME batch modification center)
To modify objects, such as BSCs, BTSs, cells, and TRXs, in batches, click the icon on the
CME configuration interface to start the batch modification wizard. For the method of
performing batch modifications through the CME batch modification center, press F1 on the
wizard interface to obtain online help.
----End
l Activating the function of stopping sending system information 5, 5bis, and 5ter after
encryption
10.2.4 Deactivation
Using MML Commands
On the BSC LMT, perform the following steps:
l Deactivating quick SDCCH handover
Run the SET GCELLSOFT command with SD Quick HO set to OFF(Off).
l Deactivating timing TCH handover
Run the SET GCELLSOFT command with TCH Time Handover Switch set to
OFF(Off).
l Deactivating Flex TSC
Run the SET GCELLSOFT command with Flex TSC Switch set to OFF(Off).
l Deactivating dummy bit randomization
Run the SET GCELLSOFT command with Dummy Bit Randomization Switch set to
OFF(Off).
l Deactivating the function of stopping sending system information 5, 5bis, and 5ter after
encryption
Run the SET GCELLSOFT command with Stop Send SI 5/5bis/5ter after Encrypt
set to OFF(Off).
l Deactivating the randomization of the filling information of SI 6
Run the SET GCELLSOFT command with SI 6 Filling Random Bits After Cipher
set to NO(No).
When configuring the A5/1 Encryption Flow Optimization feature on the CME, you must perform a
single configuration first, and then perform batch modifications if required.
You must perform a single configuration for a parameter before batch modifications of the parameter.
You are advised to perform batch modifications before logging out of the parameter setting interface.
To modify objects, such as BSCs, BTSs, cells, and TRXs, in batches, click the icon on the
CME configuration interface to start the batch modification wizard. For the method of
performing batch modifications through the CME batch modification center, press F1 on the
wizard interface to obtain online help.
----End
l Deactivating quick SDCCH handover
l Deactivating the function of stopping sending system information 5, 5bis, and 5ter after
encryption
11 Parameters
Cipher BSC690 SET GBFD-1 A5/3 Meaning: Length of the timer the BSC waits for a
CmdWa 0 BSCEX 13503 Cipherin Classmark message when the A5/3 or A5/4 ciphering
itCMTi SOFTP g algorithm is supported, if it has not received a
mer ARA Algorith Classmark message containing the ciphering
m algorithm support capability of an MS upon receiving
the Cipher Mode Command message. When this
parameter is set to 0, the BSC performs ciphering
without waiting for a Classmark message. When this
parameter is set to a value other than 0, the BSC waits
for a Classmark message from the MS. In this case, if
the BSC has received a Classmark message before the
timer expires, it stops the timer and performs
ciphering; if the BSC has not received a Classmark
message when the timer expires, it performs ciphering
based on the current MS capability information.
GUI Value Range: 0~7
Unit: s
Actual Value Range: 0~7
Default Value: 0
Cipher BSC691 SET GBFD-1 A5/3 Meaning: Length of the timer the BSC waits for a
CmdWa 0 BSCEX 13503 Cipherin Classmark message when the A5/3 or A5/4 ciphering
itCMTi SOFTP g algorithm is supported, if it has not received a
mer ARA Algorith Classmark message containing the ciphering
m algorithm support capability of an MS upon receiving
the Cipher Mode Command message. When this
parameter is set to 0, the BSC performs ciphering
without waiting for a Classmark message. When this
parameter is set to a value other than 0, the BSC waits
for a Classmark message from the MS. In this case, if
the BSC has received a Classmark message before the
timer expires, it stops the timer and performs
ciphering; if the BSC has not received a Classmark
message when the timer expires, it performs ciphering
based on the current MS capability information.
GUI Value Range: 0~7
Unit: s
Actual Value Range: 0~7
Default Value: 0
ENCRY BSC690 SET GBFD-1 A5/3 Meaning: Encryption algorithm supported by the BSS
0 GCELL 13503 Cipherin side
BASIC GBFD-1 g GUI Value Range: A5/0, A5/1, A5/2, A5/3, A5/4,
PARA 13501 Algorith A5/5, A5/6, A5/7
m
GBFD-1 Unit: None
81205 A5/1
and Actual Value Range: A5/0, A5/1, A5/2, A5/3, A5/4,
A5/2 A5/5, A5/6, A5/7
Cipherin Default Value:
g A5/0:1,A5/1:0,A5/2:0,A5/3:0,A5/4:0,A5/5:0,A5/6:0,A
Algorith 5/7:0
m
A5/4
Cipherin
g
Algorith
m
ENCRY BSC691 SET GBFD-1 A5/3 Meaning: Encryption algorithm supported by the BSS
0 GCELL 13503 Cipherin side
BASIC GBFD-1 g GUI Value Range: A5/0, A5/1, A5/2, A5/3, A5/4,
PARA 13501 Algorith A5/5, A5/6, A5/7
m
GBFD-1 Unit: None
81205 A5/1
and Actual Value Range: A5/0, A5/1, A5/2, A5/3, A5/4,
A5/2 A5/5, A5/6, A5/7
Cipherin Default Value:
g A5/0:1,A5/1:0,A5/2:0,A5/3:0,A5/4:0,A5/5:0,A5/6:0,A
Algorith 5/7:0
m
A5/4
Cipherin
g
Algorith
m
ECSC BSC690 SET GBFD-1 GSM/T Meaning: The early classmark sending control
0 GCELL 14302 D- (ECSC) parameter specifies whether the MSs in a cell
CCBAS GBFD-1 SCDMA use early classmark sending. After a successful
IC 11101 Interope immediate assignment, the MS sends additional
rability classmark information to the network as early as
System possible. The additional classmark information mainly
Informat contains the CM3 (classmark 3) information. The
ion CM3 (classmark 3) information contains the
Sending frequency band support capability of the MS (used for
the future channel assignment), power information
about each frequency band supported by the MS (used
for the handover between different frequency bands),
and encryption capability of the MS.
GUI Value Range: NO(No), YES(Yes)
Unit: None
Actual Value Range: NO, YES
Default Value: YES(Yes)
ECSC BSC691 SET GBFD-1 GSM/T Meaning: The early classmark sending control
0 GCELL 14302 D- (ECSC) parameter specifies whether the MSs in a cell
CCBAS GBFD-1 SCDMA use early classmark sending. After a successful
IC 11101 Interope immediate assignment, the MS sends additional
rability classmark information to the network as early as
System possible. The additional classmark information mainly
Informat contains the CM3 (classmark 3) information. The
ion CM3 (classmark 3) information contains the
Sending frequency band support capability of the MS (used for
the future channel assignment), power information
about each frequency band supported by the MS (used
for the handover between different frequency bands),
and encryption capability of the MS.
GUI Value Range: NO(No), YES(Yes)
Unit: None
Actual Value Range: NO, YES
Default Value: YES(Yes)
Encrypt BSC690 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 1.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm1s BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
t PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
A5/2 A57
Cipherin Default Value: A57(A5/7)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
Encrypt BSC691 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 1.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm1s BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
t PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
A5/2 A57
Cipherin Default Value: A57(A5/7)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
Encrypt BSC690 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 2.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm2n BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
d PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A56(A5/6)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC691 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 2.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm2n BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
d PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A56(A5/6)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC690 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 3.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm3r BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
d PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A55(A5/5)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC691 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 3.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm3r BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
d PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A55(A5/5)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC690 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 4.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm4t BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
h PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A54(A5/4)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC691 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 4.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm4t BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
h PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A54(A5/4)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC690 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 5.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm5t BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
h PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A53(A5/3)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC691 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 5.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm5t BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
h PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A53(A5/3)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC690 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 6.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm6t BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
h PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A52(A5/2)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC691 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 6.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm6t BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
h PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A52(A5/2)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC690 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 7.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm7t BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
h PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A51(A5/1)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
Encrypt BSC691 SET GBFD-1 A5/3 Meaning: Encryption algorithm with priority 7.
ionAlgo 0 GCELL 13503 Cipherin GUI Value Range: A51(A5/1), A52(A5/2),
rithm7t BASIC GBFD-1 g A53(A5/3), A54(A5/4), A55(A5/5), A56(A5/6),
h PARA 13501 Algorith A57(A5/7)
m
GBFD-1 Unit: None
13521 A5/1
and Actual Value Range: A51, A52, A53, A54, A55, A56,
GBFD-1 A5/2 A57
81205 Cipherin Default Value: A51(A5/1)
g
Algorith
m
A5/1
Encrypti
on Flow
Optimiz
ation
A5/4
Cipherin
g
Algorith
m
ENCRY BSC690 SET GBFD-1 A5/1 Meaning: This parameter specifies the transmission
_OPT_ 0 AITFO 13501 and mode when the BSS does not support the encryption
SWITC THPAR A5/2 algorithm of the MSC. When this parameter is set to
H A Cipherin Yes, the BSS uses non-encryption transmission mode.
g When this parameter is set to No, the BSS rejects the
Algorith call.
m GUI Value Range: NO(No), YES(Yes)
Unit: None
Actual Value Range: NO, YES
Default Value: YES(Yes)
ENCRY BSC691 SET GBFD-1 A5/1 Meaning: This parameter specifies the transmission
_OPT_ 0 AITFO 13501 and mode when the BSS does not support the encryption
SWITC THPAR A5/2 algorithm of the MSC. When this parameter is set to
H A Cipherin Yes, the BSS uses non-encryption transmission mode.
g When this parameter is set to No, the BSS rejects the
Algorith call.
m GUI Value Range: NO(No), YES(Yes)
Unit: None
Actual Value Range: NO, YES
Default Value: YES(Yes)
SDFAS BSC690 SET GBFD-1 A5/1 Meaning: Whether to enable the SDCCH quick
THOS 0 GCELL 13521 Encrypti handover function. If this parameter is set to ON, the
WITCH SOFT on Flow BSC hands over an MS to another SDCCH after
Optimiz sending an encrypted command to the MS. This
ation ensures that subsequent encrypted commands can be
sent and received on the SDCCH, increasing network
security.
GUI Value Range: OFF(Off), ON(On)
Unit: None
Actual Value Range: OFF, ON
Default Value: OFF(Off)
SDFAS BSC691 SET GBFD-1 A5/1 Meaning: Whether to enable the SDCCH quick
THOS 0 GCELL 13521 Encrypti handover function. If this parameter is set to ON, the
WITCH SOFT on Flow BSC hands over an MS to another SDCCH after
Optimiz sending an encrypted command to the MS. This
ation ensures that subsequent encrypted commands can be
sent and received on the SDCCH, increasing network
security.
GUI Value Range: OFF(Off), ON(On)
Unit: None
Actual Value Range: OFF, ON
Default Value: OFF(Off)
TCHTI BSC690 SET GBFD-1 A5/1 Meaning: This parameter specifies whether to perform
MEHO 0 GCELL 13521 Encrypti periodic intra-cell handover for speech services on
SWITC SOFT on Flow TCH.
H Optimiz GUI Value Range: OFF(Off), ON(On)
ation
Unit: None
Actual Value Range: OFF, ON
Default Value: OFF(Off)
TCHTI BSC691 SET GBFD-1 A5/1 Meaning: This parameter specifies whether to perform
MEHO 0 GCELL 13521 Encrypti periodic intra-cell handover for speech services on
SWITC SOFT on Flow TCH.
H Optimiz GUI Value Range: OFF(Off), ON(On)
ation
Unit: None
Actual Value Range: OFF, ON
Default Value: OFF(Off)
TCHTI BSC690 SET GBFD-1 A5/1 Meaning: This parameter specifies the interval at
MEHO 0 GCELL 13521 Encrypti which the speech service on a TCH is handed over.
PERIO SOFT on Flow GUI Value Range: 1~600
D Optimiz
ation Unit: s
Actual Value Range: 1~600
Default Value: 60
TCHTI BSC691 SET GBFD-1 A5/1 Meaning: This parameter specifies the interval at
MEHO 0 GCELL 13521 Encrypti which the speech service on a TCH is handed over.
PERIO SOFT on Flow GUI Value Range: 1~600
D Optimiz
ation Unit: s
Actual Value Range: 1~600
Default Value: 60
FLEXT BSC690 SET GBFD-1 Soft- Meaning: Whether to enable the function of the Flex
SCSWI 0 GCELL 18201 Synchro training sequence code (TSC). If the value of this
TCH SOFT GBFD-1 nized parameter is ON and the BTS supports the Flex TSC
17001 Network function, the BSS dynamically allocates TSCs to
Flex hopping frequencies for improving the security of
GBFD-1 calls.
13521 MAIO
A5/1 GUI Value Range: OFF(Off), ON(On)
Encrypti Unit: None
on Flow
Actual Value Range: OFF, ON
Optimiz
ation Default Value: OFF(Off)
FLEXT BSC691 SET GBFD-1 Soft- Meaning: Whether to enable the function of the Flex
SCSWI 0 GCELL 18201 Synchro training sequence code (TSC). If the value of this
TCH SOFT GBFD-1 nized parameter is ON and the BTS supports the Flex TSC
17001 Network function, the BSS dynamically allocates TSCs to
Flex hopping frequencies for improving the security of
GBFD-1 calls.
13521 MAIO
A5/1 GUI Value Range: OFF(Off), ON(On)
Encrypti Unit: None
on Flow
Actual Value Range: OFF, ON
Optimiz
ation Default Value: OFF(Off)
STOPSI BSC690 SET GBFD-1 A5/1 Meaning: This parameter specifies whether the
5SWIT 0 GCELL 13521 Encrypti sending of system information 5, 5bis, and 5ter can be
CH SOFT on Flow stopped on the SACCH on the SDCCH after the BTS
Optimiz issues a ciphering command.
ation GUI Value Range: OFF(Off), ON(On)
Unit: None
Actual Value Range: OFF, ON
Default Value: OFF(Off)
STOPSI BSC691 SET GBFD-1 A5/1 Meaning: This parameter specifies whether the
5SWIT 0 GCELL 13521 Encrypti sending of system information 5, 5bis, and 5ter can be
CH SOFT on Flow stopped on the SACCH on the SDCCH after the BTS
Optimiz issues a ciphering command.
ation GUI Value Range: OFF(Off), ON(On)
Unit: None
Actual Value Range: OFF, ON
Default Value: OFF(Off)
DUMM BSC690 SET GBFD-1 A5/1 Meaning: Whether a BTS randomizes the dummy bits
YBITR 0 GCELL 13521 Encrypti in all messages except system information that are
ANDS SOFT on Flow sent to MSs on dedicated channels. If this parameter is
WITCH Optimiz set to OFF, dummy bits are filled by 0x2B. If this
ation parameter is set to ON, dummy bits are filled by
random values.
GUI Value Range: OFF(Off), ON(On)
Unit: None
Actual Value Range: OFF, ON
Default Value: OFF(Off)
DUMM BSC691 SET GBFD-1 A5/1 Meaning: Whether a BTS randomizes the dummy bits
YBITR 0 GCELL 13521 Encrypti in all messages except system information that are
ANDS SOFT on Flow sent to MSs on dedicated channels. If this parameter is
WITCH Optimiz set to OFF, dummy bits are filled by 0x2B. If this
ation parameter is set to ON, dummy bits are filled by
random values.
GUI Value Range: OFF(Off), ON(On)
Unit: None
Actual Value Range: OFF, ON
Default Value: OFF(Off)
SI6Ran BSC690 SET GBFD-1 A5/1 Meaning: Whether to fill random bits in system
domBit 0 GCELL 13521 Encrypti information (SI) 6 after a ciphering command is sent.
SOFT on Flow GUI Value Range: NO(No), YES(Yes)
Optimiz
ation Unit: None
Actual Value Range: NO, YES
Default Value: NO(No)
SI6Ran BSC691 SET GBFD-1 A5/1 Meaning: Whether to fill random bits in system
domBit 0 GCELL 13521 Encrypti information (SI) 6 after a ciphering command is sent.
SOFT on Flow GUI Value Range: NO(No), YES(Yes)
Optimiz
ation Unit: None
Actual Value Range: NO, YES
Default Value: NO(No)
12 Counters
13 Glossary
14 Reference Documents
1. 3GPP 48.058: "Base Station Controller - Base Transceiver Station (BSC-BTS) Interface
Layer 3 Specification"
2. 3GPP TS 33.102: "3rd Generation Partnership Project; Technical Specification Group
Services and System Aspects; 3G Security; Security architecture(Release 12)"
3. 3GPP TS 43.020: "3rd Generation Partnership Project; Technical Specification Group
Services and system Aspects; Security related network functions(Release 12)"
4. 3GPP TS 44.018: "3rd Generation Partnership Project; Technical Specification Group
GSM/EDGE Radio Access Network; Mobile radio interface layer 3 specification; Radio
Resource Control (RRC) protocol(Release 12)"
5. 3GPP TS 48.008: "3rd Generation Partnership Project; Technical Specification Group
GSM/EDGE Radio Access Network; Mobile Switching Centre - Base Station
System(MSC-BSS) interface; Layer 3 specification(Release 12) "
6. 3GPP TS 24.008: "3rd Generation Partnership Project; Technical Specification Group
Core Network and Terminals; Mobile radio interface Layer 3 specification; Core
network protocols; Stage 3(Release 12)"
7. 3GPP TS 55.216: "3rd Generation Partnership Project; Technical Specification Group
Services and System Aspects; 3G Security; Specification of the A5/3 Encryption
Algorithms for GSM andEDGE, and the GEA3 Encryption Algorithm for GPRS;
Document 1: A5/3 and GEA3 Specifications(Release 6)"
8. 3GPP TS 55.226: "3rd Generation Partnership Project; Technical Specification Group
Services and System Aspects; 3G Security; Specification of the A5/4 Encryption
Algorithms for GSM and ECSD, and the GEA4 Encryption Algorithm for
GPRS(Release 12)"