SIM Cards
HomeFree Courses
  • πŸ”₯Welcome!
  • 1️⃣Technology
    • βœ…SIM Cards Technology
    • βœ…SIM Cards Internals
    • Types of SIM Cards
    • Algorithms
  • 2️⃣SIM Cards Versions
    • βœ…Companies
  • GSM Identifiers
    • Description
    • 🟒ICCID - Integrated Circuit Card Identifier
    • 🟒SIM - Subscriber Identity Module
    • IMSI -
    • Authentication key (Ki)
    • PIN2 - Personal Identification Number 2
    • PUK2 - Personal Unblocking Key 2
  • Software
    • SIMalliance CAT Loader V2.0
  • SIM card Security
    • SIM Cards Attacks
    • Page 1
Powered by GitBook
On this page

Was this helpful?

  1. Technology

Algorithms

COMP128-1 – original algorithm with known weaknesses

COMP128-2 – stronger algorithm which still clears the 10 rightmost bits of Kc

COMP128-3 – same algorithm as COMP128-2 with all 64 bits of Kc generated

COMP128-4 – based on the 3GPP (3rd Generation Partnership Project) algorithm β€œMilenage”, which uses AES

PreviousTypes of SIM CardsNextCompanies

Last updated 7 months ago

Was this helpful?

1️⃣