Authentication allows one party (Alice) to confirm the identity of
another party (Bob). This is mostly useful as a prelude
to a transaction that Alice wishes to carry out only
with a particular party (say Bob), or with a party
whose identity is known. For example, a consultant who is
paid to write a report for a particular customer may
need to confirm the customerís identity before sending the report.
The customer, on the other hand, may employ many consultants,
and be happy to receive a report from any one
of them. The customer may use authentication to reliably identify
a particular consultant involved in a transaction.
Authentication in GSM is
performed by the A3 algorithm.
Other topics in our resources on GSM related to GSM Authentication include: