Sei sulla pagina 1di 34

GSM BSS

GBSS14.0
Ciphering Feature Parameter
Description
Issue 03
Date 2013-04-12
HUAWEI TECHNOLOGIES CO., LTD.


Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.






Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: support@huawei.com
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
Contents
1 About This Document..................................................................................................................1
1.1 Scope..................................................................................................................................................................1
1.2 Intended Audience..............................................................................................................................................1
1.3 Change History...................................................................................................................................................1
2 Overview.........................................................................................................................................4
3 Kc and Its Generation...................................................................................................................6
4 A5 Ciphering Algorithm..............................................................................................................7
5 Algorithm Selection......................................................................................................................9
6 Signaling Procedure....................................................................................................................11
7 Improvements in A5 Ciphering Algorithm............................................................................13
8 Impact on KPI...............................................................................................................................15
9 Engineering Guidelines.............................................................................................................17
10 Parameters...................................................................................................................................18
11 Counters......................................................................................................................................29
12 Glossary.......................................................................................................................................30
13 Reference Documents...............................................................................................................31
GSM BSS
Ciphering Feature Parameter Description Contents
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ii
1 About This Document
1.1 Scope
This document describes ciphering of Huawei GBSS. It covers the function of and technology
mechanisms regarding this feature, including the ciphering key (Kc) generation, A5 ciphering
algorithm, ciphering algorithm selection, signaling procedure, and improvements in A5
ciphering algorithm.
1.2 Intended Audience
It is assumed that users of this document are familiar with GSM basics and have a working
knowledge of GSM telecommunication.
This document is intended for:
l Personnel working on Huawei GSM products or systems
l System operators who need a general understanding of this feature
1.3 Change History
The change history provides information on the changes in the ciphering feature in different
document versions.
There are two types of changes, which are defined as follows:
l Feature change
Feature change refers to the change in the ciphering feature of a specific product version.
l Editorial change
Editorial change refers to the change in wording or the addition of the information that was
not described in the earlier version.
Document Issues
The document issues are as follows:
GSM BSS
Ciphering Feature Parameter Description 1 About This Document
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1
l 03 (2013-04-12)
l 02 (2012-12-31)
l 01 (2012-04-28)
l Draft A (2012-02-15)
03 (2013-04-12)
This is the third commercial release of GBSS14.0.
Compared with issue 02 (2012-12-31), 03 (2013-04-12) incorporates the changes described in
the following table.
Change Type Change Description Parameter Change
Feature change None None
Editorial change Optimized chapter "8 Impact on KPI." None

02 (2012-12-31)
This is the second commercial release of GBSS14.0.
Compared with issue 01 (2012-04-28), 02 (2012-12-31) incorporates the changes described in
the following table.
Change Type Change Description Parameter Change
Feature change Added the description of randomization
of filling information of SI 6 in chapter
"7 Improvements in A5 Ciphering
Algorithm."
Added the following
parameter:
SI6RandomBit
Editorial change None None

01 (2012-04-28)
This is the first commercial release of GBSS14.0.
Compared with issue Draft A (2012-02-15), issue 01 (2012-04-28) incorporates the changes
described in the following table.
GSM BSS
Ciphering Feature Parameter Description 1 About This Document
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2
Change Type Change Description Parameter Change
Feature change Added the description of
the encryption algorithm
priority. For details, see "5
Algorithm Selection".
Added the following parameters:
l EncryptionAlgorithm1st
l EncryptionAlgorithm2nd
l EncryptionAlgorithm3rd
l EncryptionAlgorithm4th
l EncryptionAlgorithm5th
l EncryptionAlgorithm6th
l EncryptionAlgorithm7th
Editorial change None None

Draft A (2012-02-15)
This is the draft A release of GBSS14.0.
Compared with issue 01 (2011-03-31) of GBSS13.0, issue Draft A (2012-02-15) of GBSS14.0
has no change.
GSM BSS
Ciphering Feature Parameter Description 1 About This Document
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3
2 Overview
The information ciphered on the Um interface involves signaling, speech, and data. The
implementation of ciphering guarantees the information security and prevents user information
or conversation contents from unauthorized access.
The ciphering procedure is initiated on the network side. The BTS and MS cipher and decipher
the information by using the A5 algorithm and the ciphering key (Kc) generated by the A8
algorithm on the basis of the capability of the MS and BTS. Thus, the security of the information
on the Um interface is ensured. The Kc is generated by the GSM authentication center (AuC)
and stored in the MSC/VLR. The Kc is sent to the BTS before the ciphering procedure begins.
The MS and the network adopt the A8 algorithm to generate the Kc by using the same Ki and
random number (RAND).
A ciphering or deciphering sequence is generated through the A5 algorithm on the basis of the
Kc stored in the MS and the network and the frame number from the current pulse stream. The
network uses the same ciphering sequence in the uplink and downlink. For each burst, the data
is ciphered or deciphered as follows:
l One sequence is used for the MS ciphering and BTS deciphering.
l The other sequence is used for the BTS ciphering and MS deciphering.
The GSM specifications define the following ciphering algorithms:
l A5/0 Ciphering Algorithm
l A5/1 Ciphering Algorithm
l A5/2 Ciphering Algorithm
l A5/3 Ciphering Algorithm
l A5/4 Ciphering Algorithm
l A5/5 Ciphering Algorithm
l A5/6 Ciphering Algorithm
l A5/7 Ciphering Algorithm
NOTE
A5/0 means no ciphering at all.
Huawei GBSS supports A5/1, A5/2, and A5/3 ciphering algorithms.
A network operator can use the A5 ciphering algorithm only after being granted by the 3GPP
Organizational Partners. As A5/1 and A5/2 ciphering algorithms have been decoded, it is
GSM BSS
Ciphering Feature Parameter Description 2 Overview
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4
advisable that you use the more secure A5/3 ciphering algorithm or the A5/1 ciphering algorithm
with A5/1 Encryption Flow Optimization enabled.
The ciphering algorithms are selected on the basis of the capabilities of the network and MS.
The ciphering algorithms to be adopted should be those allowed in the ciphering command
delivered by the MSC, allowed in the BSC data configuration, and supported by the MS. The
BSC selects the appropriate ciphering algorithms based on the priorities of the algorithms. If the
BSS does not support the ciphering algorithms allowed in the ciphering command delivered by
the MSC, the ciphering is rejected.
The A5 ciphering algorithm provides weak protection for data security. Therefore, the ciphering
procedure is optimized on the basis of the characteristics of the Um interface transmission in
GSM, thus enhancing transmission security and network bugging defense.
GSM BSS
Ciphering Feature Parameter Description 2 Overview
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5
3 Kc and Its Generation
This describes the application and generation of the ciphering key (Kc).
The MS and the network use the same Kc for ciphering and deciphering user data.
An MS is allocated an International Mobile Station Identity (IMSI) and Ki after it is registered
in the GSM network. The MS and the network use the same Ki and RAND. The RAND is
generated by the network and sent to the MS. Both the network and the MS use the A8 algorithm
to generate the ciphering key Kc. Figure 3-1 shows the generation of the Kc.
Figure 3-1 Generation of Kc

GSM BSS
Ciphering Feature Parameter Description 3 Kc and Its Generation
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
6
4 A5 Ciphering Algorithm
This describes the application of the A5 ciphering algorithm, which is used to generate a pseudo-
random sequence. (GBFD-113501 A5/1 and A5/2 Ciphering Algorithm, GBFD-113503 A5/3
Ciphering Algorithm)
The A5 ciphering algorithm generates a 114-bit ciphering sequence or a 114-bit deciphering
sequence based on the 64-bit Kc stored in the MS and the network, and a 22-bit frame number
from the current pulse stream. The data ciphering/deciphering is achieved through the Exclusive
OR operation between the ciphering/deciphering sequence and the information bit in the
ciphered/deciphered data according to the A5 algorithm.
The network uses the same ciphering sequence in the uplink and downlink. For each burst, one
sequence is used for the MS ciphering and BTS deciphering whereas the other is used for the
BTS ciphering and MS deciphering.
The ciphering/deciphering on the radio links is performed by the BTS and MS. Figure 4-1 shows
the ciphering/deciphering process.
Figure 4-1 Ciphering/deciphering process
GSM BSS
Ciphering Feature Parameter Description 4 A5 Ciphering Algorithm
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
7
GSM BSS
Ciphering Feature Parameter Description 4 A5 Ciphering Algorithm
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
8
5 Algorithm Selection
The ciphering algorithms are selected on the basis of the capabilities of the network, BSS, and
MS. The ciphering algorithm supported by the BSS side is specified by the parameter
ENCRY.
The process of selecting the ciphering algorithms is as follows:
1. In the call access procedure, the MS sends an Establish Indication message to the BSC.
l If the parameter ECSC in the system information is set to No, the MS reports Classmark
1 or Classmark 2, indicating whether the MS supports A5/1, A5/2, and A5/3 ciphering
algorithms.
l If the parameter ECSC in the system information is set to Yes, the MS reports Classmark
1, Classmark 2, and Classmark 3, indicating whether the MS supports A5/1, A5/2, A5/3,
A5/4, A5/5, A5/6, and A5/7 ciphering algorithms.
2. On receiving the Cipher Mode Command message from the MSC, the BSC checks the
classmarks reported by the MS. If the BSC does not receive Classmark 3, the BSC sends
a Classmark Enquiry message to the MS, asking the MS to report Classmark 3. Classmark
3 defines whether an MS supports A5/4, A5/5, A5/6, and A5/7 ciphering algorithms.
The selection of the ciphering algorithms follows the following principles:
l The ciphering algorithms to be adopted should be those supported by the MSC, allowed in
the BSC data configuration, and supported by the MS.
l Set the priorities of the ciphering algorithms by setting EncryptionAlgorithm1st,
EncryptionAlgorithm2nd, EncryptionAlgorithm3rd, EncryptionAlgorithm4th,
EncryptionAlgorithm5th, EncryptionAlgorithm6th, and EncryptionAlgorithm7th. If you
do not perform any configurations on the priority, use the default priority.
l The BSC selects the appropriate ciphering algorithms based on the priorities of the
algorithms, and then sends an Encryption Command message to the BTS.
NOTE
The default priorities of the ciphering algorithms are decreased from A5/7 to A5/0.
GSM BSS
Ciphering Feature Parameter Description 5 Algorithm Selection
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
9
CAUTION
l If the BSS does not support the ciphering algorithms specified in the Cipher Mode Command
message, it sends the MSC a Ciphering Mode Reject message with the cause value Ciphering
Algorithms Not Supported.
l If the MSC requests to change the ciphering algorithms while the BSS has enabled the former
ciphering algorithms, the BSS sends a Ciphering Mode Reject message to the MSC.
GSM BSS
Ciphering Feature Parameter Description 5 Algorithm Selection
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
10
6 Signaling Procedure
This describes the signaling procedure for ciphering. The ciphering procedure generally applies
to location update, service access, and inter-BSC handover. It requests that the BSC and MSC
are configured with the ciphering algorithms and that the BTS and MS have the codec capabilities
associated with the ciphering algorithms.
The application of ciphering algorithms in the radio telecommunications system depends on the
radio resources management entity. Figure 6-1 shows the ciphering procedure, which is initiated
by the network and executed by the BTS.
Figure 6-1 Ciphering procedure
Initiating the Setting of the Ciphering Mode
When the authentication procedure is complete, the MSC sends the BSC a Ciphering Mode
Command message, which contains the Kc. The BSC sends a Ciphering Mode Command
message to the MS through the BTS. This message indicates whether the ciphering should be
performed by the MS and which ciphering algorithm should be used by the MS.
Completing the Setting of the Ciphering Mode
Completing the setting of the ciphering mode involves the following operations:
GSM BSS
Ciphering Feature Parameter Description 6 Signaling Procedure
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
11
1. On receiving a valid Ciphering Mode Command message, the MS loads the Kc stored in
the SIM card. If the MS receives an invalid Ciphering Mode Command message, the
message is considered erroneous. In this case, the MS sends an RR Status message with
the cause value Protocol Error and does no further processing.
A valid Ciphering Mode Command message is defined to be one of the following:
l One that indicates "start ciphering" and is received by the MS in "not ciphered" mode.
l One that indicates "no ciphering" and is received by the MS in "not ciphered" mode.
l One that indicates "no ciphering" and is received by the MS in "ciphered" mode.
2. After the MS receives the Ciphering Mode Command message and finishes the ciphering,
it begins to send and receive messages in ciphered mode.
l If the MS has started certain operations specified in the Ciphering Mode Command
message, it sends a Ciphering Mode Complete message to the network.
l If the "cipher response" field in the Ciphering Mode Command message is specified
"IMEISV request", the MS shall include its IMEI in the Ciphering Mode Complete
message.
3. On receiving the Ciphering Mode Complete message from the MS, the network starts
information transmission in ciphered mode.
Rejecting the Ciphering Mode
If the BSS does not support the ciphering algorithms specified in the Cipher Mode Command
message, it sends the MSC a Cipher Mode Reject message with the cause value Ciphering
Algorithm Not Supported.
GSM BSS
Ciphering Feature Parameter Description 6 Signaling Procedure
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
12
7 Improvements in A5 Ciphering Algorithm
This describes the improvements in A5 ciphering algorithm against security problems. The
ciphering procedure is optimized on the basis of the characteristics of the Um interface
transmission in GSM, and thereby enhances transmission security and network bugging defense.
( GBFD-113521 A5/1 Encryption Flow Optimization)
The optimization of the ciphering procedure is achieved from the following aspects:
l Fast SDCCH handover is adopted in the MS access process, which increases the difficulty
for the intruder to trace the user call.
Fast SDCCH handover indicates that the BTS initiates an intra-cell SDCCH handover
immediately after sending the ciphering command to the MS. Thus, the subsequent ciphered
signaling can be transmitted and received on a new signaling channel.
SDFASTHOSWITCH specifies whether this function is enabled. To avoid incompatibility
with the MS, the handover command is sent after the ciphering complete message is
received.
l The TCH timing handover is introduced to increase the difficulty for the intruder to trace
a user.
For speech calls, intra-cell handovers are performed at a specified time.
TCHTIMEHOSWITCH specifies whether the TCH timing handover is enabled. If
TCHTIMEHOSWITCH is set to Yes, the handover timer is started and the length of the
timer is TCHTIMEHOPERIOD. When TCHTIMEHOPERIOD expires, an intra-cell
forced handover is performed.
l The Hopping Sequence Number (HSN) in the Flex Training Sequence Code (TSC) and
Flex Mobile Allocation Index Offset (MAIO) differentiates one TCH from another.
Therefore, the characteristics of TCHs are different and an intruder cannot trace other TCHs
according to the characteristics of a certain TCH.
Whether to enable the Flex TSC function depends on the setting of FLEXTSCSWITCH.
If FLEXTSCSWITCH is set to Yes, the channels join in frequency hopping and each
channel is randomly assigned a TSC, ranging from 0 to 7.
l After the BTS sends the ciphering command, it stops sending System Information 5, 5bis,
and 5ter over the SACCH on the SDCCH.
STOPSI5SWITCH specifies whether to stop the sending of system information. If
STOPSI5SWITCH is set to Yes, the BTS stops sending System Information 5, 5bis, and
5ter over the SACCH on the SDCCH after sending the ciphering command. Instead, the
BTS sends System Information 6 or L2 fill frames.
GSM BSS
Ciphering Feature Parameter Description 7 Improvements in A5 Ciphering Algorithm
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
13
l The dummy bits are randomized.
DUMMYBITRANDSWITCH specifies whether to randomize the dummy bits. If
DUMMYBITRANDSWITCH is set to Yes, the BTS randomizes all the 0x2b dummy bits
in the signaling and all the dummy bits in L2 fill frames. To avoid incompatibility with the
MS, the BTS reserves the initial 0x2b dummy bits when randomizing signaling.
l Filling information of SI 6 is randomized.
The randomization of filling information of SI 6 is specified by SI6RandomBit. If this
parameter is set to YES(Yes), the BTS fills a random bit in the idle spare bit following the
valid information in SI 6 sent to the MS. The idle spare bit is contained in the SI6 rest octets
IE. The bit stream of SI 6 on the channel that carries the ongoing call changes after the
ciphering procedure starts. Therefore, intruders cannot compare the bit streams and
decipher the A5/1 ciphering algorithm.
GSM BSS
Ciphering Feature Parameter Description 7 Improvements in A5 Ciphering Algorithm
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
14
8 Impact on KPI
Impact on System Capacity
None
Impact on System Performance
The use of ciphering algorithms increases the signaling exchange and access delay of a call. If
the BSS does not support the specified ciphering algorithm, call admissions or handovers may
fail, and the system performance (for example, assignment success rate and handover success
rate) is lowered.
Enabling A5/1 Encryption Flow Optimization has the following impacts on system performance:
l Quick SDCCH handover
The success rate of intra-cell handovers increases. Consequently, the handover success
rate on the entire network increases.
The number of intra-cell handovers increases. Consequently, the number of call drops
and the call drop rate increase.
l Timing TCH handover
The success rate of intra-cell handovers increases. Consequently, the handover success
rate on the entire network increases.
The number of intra-cell handovers increases. Consequently, the number of call drops
and the call drop rate increase. In addition, the increased number of TCH handovers
results in an MOS decrease.
l Flex TSC
It is recommended that Flex TSC be enabled in an asynchronous network. This is because
enabling Flex TSC will impair link performance and therefore lead to call drop, crosstalk,
and noise in a synchronous network where Soft-Synchronized Network or IBCA is enabled.
l Stopping sending system information 5, 5bis, and 5ter after encryption
If frequencies in the BA 1 and BA2 lists have been manually modified, the received system
information 5, 5bis, and 5ter may be incomplete. This increases the handover success rate
and SDCCH call drop rate.
l Dummy bit randomization
The dummy bit randomization has a slight impact on KPIs. It can decrease the probability
of intermodulation interference generated when the MS receives signals and therefore
GSM BSS
Ciphering Feature Parameter Description 8 Impact on KPI
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
15
decreases the probability of downlink call drops due to sequence errors. However, such
call drops account for a small proportion of call drops on the live network. Therefore, the
KPIs will not be affected greatly.
GSM BSS
Ciphering Feature Parameter Description 8 Impact on KPI
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
16
9 Engineering Guidelines
Huawei equipment supports the following ciphering algorithms: A5/1, A5/2, and A5/3.
The ciphering algorithms A5/1, A5/2, and A5/3 coexist in the same system and can be flexibly
defined through data configuration to meet specific regional requirements. The 3GPP
Organizational Partners allow all countries to apply for A5/1 or A5/3 because A5/2 is prone to
be decrypted. The A5/3 ciphering algorithm is preferred over other ciphering algorithms in terms
of security.
GSM BSS
Ciphering Feature Parameter Description 9 Engineering Guidelines
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
17
10 Parameters
Table 10-1 Parameter description
Parameter ID NE MML
Command
Feature ID Feature Name Description
DUMMYBITR
ANDSWITCH
BSC6900 SET
GCELLSOFT
GBFD-113521 A5/1 Encryption
Flow
Optimization
Meaning:Wheth
er a BTS
randomizes the
dummy bits in
all messages
except system
information that
are sent to MSs
on dedicated
channels. If this
parameter is set
to OFF, dummy
bits are filled by
0x2B. If this
parameter is set
to ON, dummy
bits are filled by
random values.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
18
Parameter ID NE MML
Command
Feature ID Feature Name Description
ECSC BSC6900 SET
GCELLCCBA
SIC
GBFD-111101
GBFD-114302
System
Information
Sending
GSM/TD-
SCDMA
Interoperability
Meaning:The
early classmark
sending control
(ECSC)
parameter
specifies
whether the MSs
in a cell use early
classmark
sending. After a
successful
immediate
assignment, the
MS sends
additional
classmark
information to
the network as
early as
possible. The
additional
classmark
information
mainly contains
the CM3
(classmark 3)
information.
The CM3
(classmark 3)
information
contains the
frequency band
support
capability of the
MS (used for the
future channel
assignment),
power
information
about each
frequency band
supported by the
MS (used for the
handover
between
different
frequency
bands), and
encryption
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
19
Parameter ID NE MML
Command
Feature ID Feature Name Description
capability of the
MS.
GUI Value
Range:NO(No),
YES(Yes)
Unit:None
Actual Value
Range:NO, YES
Default
Value:YES
(Yes)
ENCRY BSC6900 SET
GCELLBASIC
PARA
GBFD-113501
GBFD-113503
A5/1 and A5/2
Ciphering
Algorithm
A5/3 Ciphering
Algorithm
Meaning:Encry
ption algorithm
supported by the
BSS side
GUI Value
Range:A5/0,
A5/1, A5/2,
A5/3, A5/4,
A5/5, A5/6,
A5/7
Unit:None
Actual Value
Range:A5/0,
A5/1, A5/2,
A5/3, A5/4,
A5/5, A5/6,
A5/7
Default
Value:A5/0-1&
A5/1-0&A5/2-0
&A5/3-0&A5/4
-0&A5/5-0&A5
/6-0&A5/7-0
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
20
Parameter ID NE MML
Command
Feature ID Feature Name Description
EncryptionAlg
orithm1st
BSC6900 SET
GCELLBASIC
PARA
GBFD-113501
GBFD-113503
GBFD-113521
A5/1 and A5/2
Ciphering
Algorithm
A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization
Meaning:Encry
ption algorithm
with priority 1.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A57
(A5/7)
EncryptionAlg
orithm2nd
BSC6900 SET
GCELLBASIC
PARA
GBFD-113501
GBFD-113503
GBFD-113521
A5/1 and A5/2
Ciphering
Algorithm
A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization
Meaning:Encry
ption algorithm
with priority 2.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A56
(A5/6)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
21
Parameter ID NE MML
Command
Feature ID Feature Name Description
EncryptionAlg
orithm3rd
BSC6900 SET
GCELLBASIC
PARA
GBFD-113501
GBFD-113503
GBFD-113521
A5/1 and A5/2
Ciphering
Algorithm
A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization
Meaning:Encry
ption algorithm
with priority 3.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A55
(A5/5)
EncryptionAlg
orithm4th
BSC6900 SET
GCELLBASIC
PARA
GBFD-113501
GBFD-113503
GBFD-113521
A5/1 and A5/2
Ciphering
Algorithm
A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization
Meaning:Encry
ption algorithm
with priority 4.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A54
(A5/4)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
22
Parameter ID NE MML
Command
Feature ID Feature Name Description
EncryptionAlg
orithm5th
BSC6900 SET
GCELLBASIC
PARA
GBFD-113501
GBFD-113503
GBFD-113521
A5/1 and A5/2
Ciphering
Algorithm
A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization
Meaning:Encry
ption algorithm
with priority 5.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A53
(A5/3)
EncryptionAlg
orithm6th
BSC6900 SET
GCELLBASIC
PARA
GBFD-113501
GBFD-113503
GBFD-113521
A5/1 and A5/2
Ciphering
Algorithm
A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization
Meaning:Encry
ption algorithm
with priority 6.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A52
(A5/2)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
23
Parameter ID NE MML
Command
Feature ID Feature Name Description
EncryptionAlg
orithm7th
BSC6900 SET
GCELLBASIC
PARA
GBFD-113501
GBFD-113503
GBFD-113521
A5/1 and A5/2
Ciphering
Algorithm
A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization
Meaning:Encry
ption algorithm
with priority 7.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A51
(A5/1)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
24
Parameter ID NE MML
Command
Feature ID Feature Name Description
FLEXTSCSWI
TCH
BSC6900 SET
GCELLSOFT
GBFD-113521
GBFD-118201
GBFD-117001
A5/1 Encryption
Flow
Optimization
Soft-
Synchronized
Network
Flex MAIO
Meaning:Wheth
er to enable the
function of the
Flex training
sequence code
(TSC). If the
value of this
parameter is ON
and the BTS
supports the
Flex TSC
function, the
BSS
dynamically
allocates TSCs
to hopping
frequencies for
improving the
security of calls.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
25
Parameter ID NE MML
Command
Feature ID Feature Name Description
SDFASTHOS
WITCH
BSC6900 SET
GCELLSOFT
GBFD-113503 A5/3 Ciphering
Algorithm
Meaning:Wheth
er to enable the
SDCCH quick
handover
function. If this
parameter is set
to ON, the BSC
hands over an
MS to another
SDCCH after
sending an
encrypted
command to the
MS. This
ensures that
subsequent
encrypted
commands can
be sent and
received on the
SDCCH,
increasing
network
security.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
26
Parameter ID NE MML
Command
Feature ID Feature Name Description
SI6RandomBit BSC6900 SET
GCELLSOFT
GBFD-113521 A5/1 Encryption
Flow
Optimization
Meaning:Wheth
er to fill random
bits in system
information (SI)
6 after a
ciphering
command is
sent.
GUI Value
Range:NO(No),
YES(Yes)
Unit:None
Actual Value
Range:NO, YES
Default
Value:NO(No)
STOPSI5SWI
TCH
BSC6900 SET
GCELLSOFT
GBFD-113521 A5/1 Encryption
Flow
Optimization
Meaning:This
parameter
specifies
whether the
sending of
system
information 5,
5bis, and 5ter
can be stopped
on the SACCH
on the SDCCH
after the BTS
issues a
ciphering
command.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
27
Parameter ID NE MML
Command
Feature ID Feature Name Description
TCHTIMEHO
PERIOD
BSC6900 SET
GCELLSOFT
GBFD-113521 A5/1 Encryption
Flow
Optimization
Meaning:This
parameter
specifies the
interval at which
the speech
service on a
TCH is handed
over.
GUI Value
Range:1~600
Unit:s
Actual Value
Range:1~600
Default Value:
60
TCHTIMEHO
SWITCH
BSC6900 SET
GCELLSOFT
GBFD-113521 A5/1 Encryption
Flow
Optimization
Meaning:This
parameter
specifies
whether to
perform
periodic intra-
cell handover
for speech
services on
TCH.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)
GSM BSS
Ciphering Feature Parameter Description 10 Parameters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
28
11 Counters
Table 11-1 Counter description
Counter ID Counter Name Counter
Description
NE Feature ID Feature Name
1282432419 CELL.SPT.CIP
HER.CMD.A5.
3
A3413C:Numbe
r of Cipher
Commands
(A5/3)
BSC6900 GBFD-113503 A5/3 Ciphering
Algorithm
1282432420 CELL.SPT.CIP
HER.SUCC.A5.
3
A3433S:Numbe
r of Successful
Cipher Times
(A5/3)
BSC6900 GBFD-113503 A5/3 Ciphering
Algorithm
GSM BSS
Ciphering Feature Parameter Description 11 Counters
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
29
12 Glossary
For the acronyms, abbreviations, terms, and definitions, see the Glossary.
GSM BSS
Ciphering Feature Parameter Description 12 Glossary
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
30
13 Reference Documents
1. 3GPP 48.058: "Base Station Controller - Base Transceiver Station (BSC-BTS) Interface
Layer 3 Specification"
2. BSC6900 Feature List
3. BSC6900 Optional Feature Description
4. BSC6900 GSM Parameter Reference
5. BSC6900 GSM MML Command Reference
6. BSC6900 GSM Performance Counter Reference
GSM BSS
Ciphering Feature Parameter Description 13 Reference Documents
Issue 03 (2013-04-12) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
31

Potrebbero piacerti anche