Question
In GSM, each home network has an AuC database containing user keys Ki. Instead, a process known as key diversification could be used. Key diversification
In GSM, each home network has an AuC database containing user keys Ki. Instead, a process known as key diversification could be used. Key diversification works as follows. Let h be a secure cryptographic hash function and let KM be a master key known only to the AuCs. In GSM, each user has a unique ID known as an IMSI. In this key diversification scheme, a users key Ki would be given by Ki = h(KM, IMSI), and this key would be stored on the mobile. Then given any IMSI, the AuC would compute the key as Ki = h(KM, IMSI).
a. What is the primary advantage of key diversification?
b. What is the primary disadvantage of key diversification?
c. Why do you think the designers of GSM chose not to employ key diversification?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started