From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a9973708a303a563b6db9f6f3b2cc8547e022b6c7f1b6661847a73906b96c60c
Message ID: <1.5.4.32.19961119163629.006c216c@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-11-19 16:38:37 UTC
Raw Date: Tue, 19 Nov 1996 08:38:37 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Tue, 19 Nov 1996 08:38:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: CAVE Query
Message-ID: <1.5.4.32.19961119163629.006c216c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
We've received by black bag a 25-page doc entitled:
TR45.3, Appendix A to IS-54, Rev. B
Dual-Mode Cellular System
Authentication, Message Encryption, Voice Mask
Generation, A-Key Verification, and Test Data
February, 1992. No Source.
It describes the CAVE cryptographic function in detail,
and its use to generate a set of cryptovariables for the
Cellular Message Encryption Algorithm (CMEA); for
generation of 520 bits for the duplex voice privacy masks;
and for other tasks.
Each page warns that information in the document may be
subject to export jurisdiction under ITAR.
Does anyone know if this is already available on the
Web?
TIA of incarceration.
Return to November 1996
Return to “John Young <jya@pipeline.com>”