34. Peer
Peer
Authenticator
Authenticator
EAP-Request/Identity
EAP-Response/Identity (Includes user’s NAI)
Server runs AKA algorithms,
generates RAND and AUTN.
EAP-Request/AKA-Challenge (AT_RAND, AT_AUTN, AT_MAC)
Peer runs AKA algorithms, verifies AUTN
and MAC, derives RES and session key
EAP-Response/AKA-Challenge (AT_RES, AT_MAC)
Server checks the given RES,
and MAC and finds them correct.
EAP-Success
39. COMMAND CLASS INS P1 P2 P3
INVALIDATE 'A0' '04' '00' '00' '00'
9.2.15 REHABILITATE
COMMAND CLASS INS P1 P2 P3
REHABILITATE 'A0' '44' '00' '00' '00'
9.2.16 RUN GSM ALGORITHM
COMMAND CLASS INS P1 P2 P3
RUN GSM
ALGORITHM
'A0' '88' '00' '00' '10'
Command parameters/data:
Byte(s) Description Length
1 - 16 RAND 16
Response parameters/data:
Byte(s) Description Length
1 - 4 SRES 4
5 - 12 Cipher Key Kc 8
The most significant bit of SRES is coded on bit 8 of byte 1. The most significant bit of Kc is coded on bit 8 of byte 5.
9.2.17 SLEEP
COMMAND CLASS INS P1 P2 P3
3GPP TS 11.11