• Nem Talált Eredményt

GSM and UMTS security

N/A
N/A
Protected

Academic year: 2022

Ossza meg "GSM and UMTS security"

Copied!
6
0
0

Teljes szövegt

(1)

© 2007 Levente Buttyán

GSM and UMTS security

2/11 GSM and UMTS security

Why is security more of a concern in wireless?

ƒ no inherent physical protection

– physical connections between devices are replaced by logical associations – sending and receiving messages do not need physical access to the network

infrastructure (cables, hubs, routers, etc.)

ƒ broadcast communications

– wireless usually means radio, which has a broadcast nature – transmissions can be overheard by anyone in range – anyone can generate transmissions,

• which will be received by other devices in range

• which will interfere with other nearby transmissions and may prevent their correct reception (jamming)

¾ eavesdropping is easy

¾ injecting bogus messages into the network is easy

¾ replaying previously recorded messages is easy

¾ illegitimate access to the network and its services is easy

¾ denial of service is easily achieved by jamming

(2)

3/11 GSM and UMTS security

GSM Security

ƒ main security requirement

– subscriber authentication (for the sake of billing)

• challenge-response protocol

• long-term secret key shared between the subscriber and the home network operator

• supports roaming without revealing long-term key to the visited networks

ƒ other security services provided by GSM

– confidentiality of communications and signaling over the wireless interface

• encryption key shared between the subscriber and the visited network is established with the help of the home network as part of the subscriber authentication protocol

– protection of the subscriber’s identity from eavesdroppers on the wireless interface

• usage of short-term temporary identifiers

The SIM card (Subscriber Identity Module)

ƒ tamper-resistant

ƒ protected by a PIN code (checked locally by the SIM)

ƒ removable from the terminal

ƒ contains all data specific to the end user which have to reside in the Mobile Station:

– IMSI: International Mobile Subscriber Identity (permanent user’s identity)

– PIN

– TMSI (Temporary Mobile Subscriber Identity) – Ki : User’s secret key

– CK : Ciphering key

– List of the last call attempts – List of preferred operators

– Supplementary service data (abbreviated dialing, last short messages received,...)

(3)

5/11 GSM and UMTS security

GSM authentication and cipher key setup

A3 A8

RAND K

SRES' CK'

A3 A8

RAND

K

SRES CK

PRNG RAND

SRES = SRES'? mobile phone

+ SIM card visited

network home

network IMSI

IMSI

(RAND, SRES, CK) RAND

SRES'

6/11 GSM and UMTS security

Ciphering in GSM

A5A5

CIPHERING SEQUENCE PLAINTEXT

SEQUENCE

Kc FRAME NUMBER

Sender

(Mobile Station or Network)

Receiver

(Network or Mobile Station)

CIPHERTEXT

SEQUENCE

A5A5

CIPHERING SEQUENCE

Kc FRAME NUMBER

PLAINTEXT SEQUENCE

(4)

7/11 GSM and UMTS security

Conclusion on GSM security

ƒ focused on the protection of the air interface

ƒ no protection on the wired part of the network (neither for privacy nor for confidentiality)

ƒ the visited network has access to all data (except the secret key of the end user)

ƒ generally robust, but a few successful attacks have been reported:

– faked base stations – cloning of the SIM card

3GPP security design principles

ƒ Reuse of 2

nd

generation security principles (GSM):

– Removable hardware security module

• In GSM: SIM card

• In 3GPP: USIM (User Services Identity Module) – Radio interface encryption

– Limited trust in the Visited Network

– Protection of the identity of the end user (especially on the radio interface)

ƒ Correction of the following weaknesses of the previous generation:

– Possible attacks from a faked base station

– Cipher keys and authentication data transmitted in clear between and within networks

– Encryption not used in some networks Îopen to fraud – Data integrity not provided

– …

(5)

9/11 GSM and UMTS security

3GPP authentication vectors

f1

f2 f3 f4 f5

MAC

XRES CK IK

AK

PRNG SQN

SQN⊕AK AMF AMF

RAND AUTN

K

RAND

AMF: Authentication and Key Management Field

10/11 GSM and UMTS security

Processing in the USIM

USIM: User Services Identity Module

f1f1 f2f2 f3f3 f4f4

K

XMAC (Expected MAC)

RES (Response)

CK (Cipher

Key)

IK (Integrity

Key) f5f5

RAND

AK

SQN

SQNAK

AMF MAC

AUTN

• Verify that SQN is in the correct range

• Verify MAC = XMAC

• Verify that SQN is in the correct range

• Verify MAC = XMAC

(6)

11/11 GSM and UMTS security

Conclusion on 3GPP security

ƒ Some improvement with respect to 2

nd

generation

– Cryptographic algorithms are published

– Integrity of the signalling messages is protected

ƒ Quite conservative solution

ƒ Privacy/anonymity of the user not completely protected

ƒ 2

nd

/3

rd

generation interoperation will be complicated and

might open security breaches

Hivatkozások

KAPCSOLÓDÓ DOKUMENTUMOK

Besides the Dominican Monastery Foundation of Vasvár I did research in the following institutions: Historical Archives of the State Security Services, Jesuit Archives and

BURKE’s theory of identity control (Burke, a) and using a metaphor of space I formulate the hypothesis that the solution to the fundamental question of economic ethics lies one

Interface message structure (lifestyle management module) For the work ergonomics module, a similar structure is used, with the same controls and event types, but of course,

In those tests, the encryption package, which was used during communication, had to be the same as the highest-level security of HTTPS communication setting recognized by the

The security realm concept is similar to the security feature group concept defined in 3GPP TS 33.401 [16]. Security realms extend the security feature groups to consider the

The Third Generation mobile cellular technology developed by 3GPP - known variously as Universal Mobile Telecommunications System (UMTS), Freedom of Mobile Multimedia Access

So a user can access #S different services above #C different types of contents through #E different user interface elements using # A different actions that a user must learn to

Keywords: network configuration, microwave access networks, interference, frequency allocation, link