
Smart Cards Lab COMPGA12 University College London
However if the PIN is correct, the counter for the number of CHV at-
tempts will be reset to 3.
14.4 Cryptographic Functionality of a SIM Card
Imagine that the base station in GMS sends to the mobile phone a 16-byte
random. Choose one example or write your own (the length MUST be 16
bytes):
RUN GSM ALGORITHM
CLA INS P1 P2 Le RAND
A0 88 00 00 10
This command will work ONLY if DF
GSM
or a sub-directory is selected,
and if cardholder verification was performed.
The answer should be:
SW1 SW2
9F
Where is the length of the response data that we will now recover
with GET RESPONSE command:
GET RESPONSE
CLA INS P1 P2 Le
A0 C0 00 00
The answer should now be split as 4+8+2:
Here SRES = = A3(Ki,RAND) and
Kc= = A8(Ki,RAND)
Starting from now, SRES will be sent to the base station, and the phone
conversation will be encrypted using A5/x algorithm with key Kc.
c
Nicolas T. Courtois 2009-10
Comentarios a estos manuales