
We've received by black bag a 25-page doc entitled: TR45.3, Appendix A to IS-54, Rev. B Dual-Mode Cellular System Authentication, Message Encryption, Voice Mask Generation, A-Key Verification, and Test Data February, 1992. No Source. It describes the CAVE cryptographic function in detail, and its use to generate a set of cryptovariables for the Cellular Message Encryption Algorithm (CMEA); for generation of 520 bits for the duplex voice privacy masks; and for other tasks. Each page warns that information in the document may be subject to export jurisdiction under ITAR. Does anyone know if this is already available on the Web? TIA of incarceration.

how about posting it to anonymously to the USENET and providing a link from your page to DejaNews explaining how to do a filter query. igor John Young wrote:
We've received by black bag a 25-page doc entitled:
TR45.3, Appendix A to IS-54, Rev. B
Dual-Mode Cellular System
Authentication, Message Encryption, Voice Mask Generation, A-Key Verification, and Test Data
February, 1992. No Source.
It describes the CAVE cryptographic function in detail, and its use to generate a set of cryptovariables for the Cellular Message Encryption Algorithm (CMEA); for generation of 520 bits for the duplex voice privacy masks; and for other tasks.
Each page warns that information in the document may be subject to export jurisdiction under ITAR.
Does anyone know if this is already available on the Web?
TIA of incarceration.
- Igor.
participants (2)
-
ichudov@algebra.com
-
John Young