Sim Card (Subscriber Identity Module)
It is a minor flake that carries together with shop information of GSM user. Sim menu is genuinely a retention module or registers. GSM user keeps sim menu on their mobile device. Besides, that sim menu has a lot of other purpose that nosotros going explicate inward this post thus continue reading. Check below tabular array content that nosotros are going to explain.
- Network Identity
- IMSI
- Tmsi
- MSISDN (Mobile Subscriber Integrated Services Digital Network-Number)
- Ki(Secret key) & Ki (cipher key)
- LAI (location expanse identity)
- Algorithms (A8 ,A3 & A5)
- pin, pin2, puk, puk2
1- Network Identity
Sim menu carries a network code that identifies where is network located. This defines its type, similar STC, MTN etc.2- IMSI
It is a series that separates every segment. This series should endure kept hidden because this tin forcefulness out exercise for whatever endeavor to hack to bag its residue or mutual information.3-Tmsi
When a GSM user inserts their Sim menu inward his mobile thus IMSI series should shipping to the network. This all because to continue y'all condom from the hack. The IMSI series is replaced past times TMSI. This alter is temporary thus that hacker cannot recognize it.4- MSISDN (Mobile Subscriber Integrated Services Digital Network-Number)
MSISDN is known every bit a mobile number. This set out contains the consummate address of GSM user. E.g it contains a dry reason code, network code, etc which position the address. Tag: What is just Mobile set out made of?
5- Ki(Secret key) & Ki (cipher key)
Ki (Secret key) together with ki ( Cipher key) is used for information transfer together with security.6- LAI (location expanse identity)
LAI is used for Identification of GSM user. This information is stored past times Mobile station inward Sim Card. When GSM user changes their location thus MS asking for location update together with sends this novel location to the mobile provider. This helps mobile provider to position the mobile station inward representative of an incoming call.7- Algorithms (A8 ,A3 & A5)
Algorithms A8 together with A3 are used for authentication procedure (validation) together with algorithm A5 is used for ciphering (Encryption).9-pin, pin2, puk, puk2
These are simply about exceptional set out codes used for GSM user security. Users are allowed to access this code for usage together with modification.Don't forget to Share this post amongst y'all friends