CELLULAR TELEPHONE NETWORK SECURITY.ppt
《CELLULAR TELEPHONE NETWORK SECURITY.ppt》由会员分享,可在线阅读,更多相关《CELLULAR TELEPHONE NETWORK SECURITY.ppt(45页珍藏版)》请在麦多课文档分享上搜索。
1、CELLULAR TELEPHONE NETWORK SECURITY,Ari Vesanen, ari.vesanenoulu.fi Department of Information Processing Sciences, University of Oulu,Contents,Introduction to GSM GSM network structure and properties GSM network security model GSM network security threats GPRS vs. GSM Security UMTS vs. GSM Security,
2、Introduction to GSM,GSM worlds most widely used cellular phone system About 1000 million users First digital cellular phone standard 1982 GSM (Groupe Special Mobile) committee to create standard 1989 ETSI (European Telecommunications Standards Institute) responsible for development 1990 first specif
3、ications frozen,GSM specifications developed secretly No public evaluation according to scientific procedure Kerckhoffs principle violated: Algorithm strength should depend on secrecy of key and not on the secrecy of the algorithm itself GSM specifications and encryption algorithms have leaked and b
4、een subject to criticism,GSM Network Structure,Mobile station MS,SIM,PHONE,BTS,BTS,BSC,BSC,HLR,AuC,EIR,VLR,Base Station subsystem BSS,Network Switching Subsystem NSS,MSC,PLMN, PSTN, .,Abis,Um,A,Mobile Station = phone + SIM SIM = Subscriber Identity Module User identity IMSI (International Mobile Sub
5、scriber Identity) on SIM MSISDN (Mobile Subscriber International Integrated Services Digital Network) number = Phone number on SIM Phone identity IMEI (International Mobile Equipment Identity) in phone Got from phone: type *#06#,BSS components: Base Transceiver Station (BTS) and Base Station Control
6、ler (BSC) BTS controls radio communication with phone, encrypts calls and does decryption BSC can control several BTSs, tasks Initialization of radio channel Frequency hopping Handover (transferring user between cells) Traffic between BSS and MSC,NSS = MSC + SMSC + Registers (+ OSS) Mobile Services
7、Switching Centre (MSC) Main component of NSS Works as link to wired network Services for registering and authenticating mobile user Services related to mobility Short Message Service Centre (SMSC) Transmission of short messages Needs routing information - works in co-operation with HLR,HLR (Home Loc
8、ation Register) Information on subscribers registered in this GSM network Current location of users (location networks VLR address) One network can contain only one HLR VLR (Visitor Location Register) Relevant information on all active users in GSM network AuC (Authentication Center) User secret key
9、 information by IMSI EIR (Equipment Identity Register) Valid equipments by their IMEI code,GSM Network Radio Interface,Band control: combined TDMA/FDMA FDMA divides band into 200 kHz wide channels GSM 900 124 channels GSM 1800 374 channels Channels grouped and distributed to operators Carrier freque
10、ncy into time frames according to TDMA model TDMA frame = eight time intervals (slots) Message in one slot = burst Logical channel = one slot in one frame,Frequency hopping 216,7 hops/second After each burst frequency changed according to predefined pattern Spreads disturbances Makes eavesdropping m
11、ore difficultTDMA/FDMA model technically challenging,Establishing Call,Updating location Uses MSC, HLR and VLR When MS moves to new location area or to new operator area - must register for update Location update message to new MSC/VLR pair that registers new information and sends it to subscribers
12、HLR. HLR sends the previous VLR information that subscriber left its area,Phones home MSC,Phones location MSC,Incoming call,HLR,VLR,BTS,BSC,MS,Call Routing,1,6,2,3,4,5,GSM Network Security Model,Identification of subscriber IMSI IMSI consists of three components: Mobile Country Code (MCC) Mobile Net
13、work Code (MNC) Mobile Subscriber Identity Number (MSIN) TMSI temporary identifier, used instead of IMSI in communication Changed when location changed Makes IMSI capturing and subscriber communication monitoring more difficult,Authentication Actors: SIM card and (home networks) Authentication Cente
14、r (AuC) Authenticates user to network (not vice versa) Based on secret 128 bit key Ki (resides only on SIM and in AuC) Authentication always in home network! Authentication algorithm may be changed, yet works in visited networks Authentication method challenge-response Algorithm A3,MSC,HLR,AuC,MS,Re
15、gister to network,6. Check SRES,4. RAND,5. SRES,2. Request authentication triplet,3. Authentication triplet (RAND,SRES,Kc),Authentication in GSM Network,SRES = A3(RAND,Ki) Kc = Air interface encryption key,Air interface encryption Encryption algorithm A5 must reside in phone, for all network operato
16、rs common algorithm Key generated using algorithm A8 on SIM, hence may be operator specific Uses (64 bit) session key Kc = A8(RAND, Ki) and (22 bit) TDMA frame number A5 stream cipher, re-synchronized for each frame Kc rarely updated (in connection with authentication) Only air interface encrypted i
17、n GSM network, no encryption in operator network Relied on physical security,MS (A),BTS (B),Air Interface Encryption in GSM Network,A5,A5,Kc (64 bit),Frame no (22 bit),Kc (64 bit),CIPHER A-B,XOR,XOR,PLAIN A-B,CIPHER B-A,PLAIN B-A,XOR,XOR,PLAIN B-A,PLAIN A-B,Frame no (22 bit),114 bit,114 bit,114 bit,
18、114 bit,Algorithms,SAGE group under ETSI designed algorithms Composition secret A3, Device authentication algorithm Takes as parameters 128 bit key Ki and random number RAND, computes 32 bit fingerprint, SRES. Almost without exception: COMP128 algorithm used both as A3 and A8 COMP128 proposed in GSM
19、 specification,A8 air interface encryption key generation algorithm Mostly COMP128 Takes as parameters 128 bit key Ki and random number RAND, computes 64 bit session key Kc Kc used until MSC decides to re-authenticate device Both A3 and A8 on SIM card Operator can decide algorithms Authentication do
20、ne in subscribers home network - local network does not have to know algorithms, yet authentication works also when user roams,COMP128 not public, found out using SIM cards and leaked specifications http:/www.iol.ie/kooltek/a3a8.txt (Marc Briceno, Ian Goldberg and David Wagner) implementation Publis
21、hed in April 1998 Produces both SRES and Kc in one run Upper 32 bits SRES Lowest 54 bits + 10 zeros Kc - effectively Kc is 54 bit!,A5 Air Interface Encryption Algorithm,Stream cipher algorithm ”Original” European algorithm A5 leaked in general already in 1994, details in May 1999 (Briceno from GSM p
22、hone) Initialized each sent frame Key Kc used during call, but 22-bit frame number changed,European A5 Three feedback shift registers (LFSR = Linear Feedback Shift Register) of different lengths Register lengths 19, 22 and 23 bits Register values XORed and obtained bit XORed with plaintext bit Regis
23、ters initialized using session key Kc and frame number After initialization 228 bits pseudo random bit stream formed: 114 first bits to encrypt frame from device to base station, rest 114 bits from base station to device Cf. http:/cryptome.org/a51-bsw.htm,| | | | | | | | | | | | | | | | | |,| | | |
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CELLULARTELEPHONENETWORKSECURITYPPT
