Skip to content
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A8 Ciphering Key Generating Algorithm A8

This algorithm is used in conjunction with Ki , the authentication key, and RAND (Random Number) to generate Kc (Cipher Key). This is used with A5/X to cipher the data stream between the MS (Mobile Station) and the GSM network.
Decoding Telecoms Subscribe

DecodingTelecoms - Term of the week

Get your weekly dose of telecoms terminology delivered straight to your inbox! No spam - just clear-cut telecoms terms to keep you on top of your game.

YouTube Subscribe

Subscribe to our YouTube Channel

With over 200 free videos (and counting!) covering a range of technology topics our channel is the place to be. Subscribe to be the first to know when we release videos.
Free trial of Introduction to 5G

FREE Intro to 5G Sample Course

Use this no-obligation free trial to get a taste of what it’s like to be an Mpirical student. Included with the trial is an all-access pass to our learning platform.

Learn more with Mpirical

We offer a wide variety of live and on demand courses covering 2G, 3G, 4G and 5G, RAN and core-focused training, complementary technologies including Wi-Fi, security and packet transport networks.

View All

Ready to experience Mpirical for yourself?

Start a free trial and experience Mpirical's learning for yourself...