Gsm-security - gsm-security.net - GSM Security
General Information:
Latest News:
What is a Subscriber Identity Module (SIM)? 2 Sep 2010 | 02:24 am
The Subscriber Identity Module (SIM) is a small smart card which contains both programming and information. The A3 and A8 algorithms are implemented in the Subscriber Identity Module (SIM). Subscriber...
How Do I Use CallerID? 2 Sep 2010 | 02:22 am
Calling Line Identification Presentation (CLIP) affects your reception of CallerID data: Activate Incoming (CLIP) * 30 # SEND Deactivate Incoming (CLIP) # 30 # SEND Verify Incoming (CLIP) *# 30 # SEND...
How Do I change my PIN and PUK? 2 Sep 2010 | 02:20 am
Change SIM Card PIN ** 04 * old PIN * new PIN * new PIN # Change SIM Card PIN2 ** 042 * old PIN2 * new PIN2 *new PIN2 # Change SIM Card PUK ** 05 * old PUK * new PUK * new PUK # Change SIM Card PUK2 *...
What Are the PIN and PUK? 2 Sep 2010 | 02:19 am
PIN (Personal Identity Number) is a 4-8 digit access code which can be used to secure your telephone from use. PIN2 (Personal Identity Number 2) is a 4-8 digit access code which can be used to access ...
What is a TIMSI? 2 Sep 2010 | 02:18 am
The TIMSI (Temporary IMSI) is a pseudo-random number generated from the IMSI (International Mobile Subscriber Identity) number. The TIMSI is utilized in order to remove the need to transmit the IMSI o...
What is an IMSI? 2 Sep 2010 | 02:15 am
The IMSI (International Mobile Subscriber Identity) is a unique 15-digit code used to identify an individual user on a GSM network. The IMSI consists of three components: Mobile Country Code (MCC) Mob...
What is an IMEI? 2 Sep 2010 | 02:03 am
The IMEI (International Mobile Equipment Identity) is a unique 17 or 15 digit code used to identify an individual mobile station to a GSM or UMTS network. The IMEI number provides an important functio...
What Are locking and unlocking? 2 Sep 2010 | 01:51 am
Most GSM Mobile Stations (MS) are sold to be used on a specific GSM network. The Mobile Stations are “locked” to only accept a Subscriber Identity Module (SIM) from the GSM carrier that sold the Mobil...
Have the A5 algorithms been broken? 2 Sep 2010 | 01:48 am
Alex Biryukov, Adi Shamir and David Wagner showed that they can find the A5/1 key in less than a second on a single PC with 128 MB RAM and two 73 GB hard disks, by analyzing the output of the A5/1 alg...
Have the A3 and A8 algorithms been broken? 2 Sep 2010 | 01:46 am
Most GSM providers use a version of COMP128 for both the A3 authentication algorithm and the A8 key generation algorithm. Ian Goldberg and David Wagner of the University of California at Berkeley demo...