This document describes detailed cryptographic 2 procedures for wireless
3 system applications. These procedures are used to perform the security
4 services of mutual authentication between mobile stations and base
5 stations, subscriber message encryption, and key agreement within
6 wireless equipment.