SlideShare a Scribd company logo
Securing Wireless Cellular Systems Arvind Padmanabhan [email_address] 9 th  May 2009
Contents Scope Cellular Basics Security Goals Elements of Security Protocol Procedures Algorithmic Background GSM Flaws & Solutions Implementation Challenges Conclusion References
Scope
Cellular Basics – Network Architecture GSM MS SS7 BTS BSC MSC VLR HLR AuC GMSC BSS PSTN NSS A E C D PSTN Abis B H MS IP GPRS MS  PSDN Gi SGSN Gr Gb Gs GGSN Gc Gn UMTS UE  Node B RNC RNS Iub IuCS ATM IuPS
Cellular Basics – GSM Protocol Stack Control Plane MS BTS BSC MSC/VLR
Cellular Basics – GPRS Protocol Stack Control Plane
Cellular Basics – UMTS Protocol Stack Control Plane
Security Threats Eavesdropping Spoofing – mobile phishing Denial of service Hacking into Core Network Theft of SIM Theft of mobile phone Employees, partners, sub-contractors Viruses, worms, trojans
Security Goals User identity confidentiality User location confidentiality User untraceability User authentication Network authentication Data confidentiality Data integrity Algorithm and key agreement Mobile equipment identification User-to-USIM authentication USIM-Terminal authentication
Security Contexts User-SIM context Air interface context RAN-CN context CN context Authentication context Application context
What is AKA? AKA is  also known as   Authentication and Key Agreement Network authenticates the subscriber Subscriber authenticates the network (not in GSM) Both parties agree on the keys to use for data confidentiality and data integrity USIM AuC
GSM AKA A3 Mobile Station Radio Link GSM Operator A8 A5 A3 A8 A5 K i K i K c K c SIM Authentication: are SRES values equal? Challenge RAND m i Encrypted Data m i Signed response (SRES) SRES SRES F n F n
AKA Overview
Location Update Procedure Get CKSN  from SIM Get Auth Vector from AuC Invoke SIM  calculations Secure data exchange
Incoming Call
RRC Security Procedure
Security Procedure at UE RRC
Change of Location Area User Identity Request User Identity Response Security context is transferred from the old VLR/SGSN to the new VLR/SGSN
Authenticated Session Lifetime START < Yes Session is valid. Keys can be re-used. THRESHOLD No Keys have reached their end of life. Set START as invalid. Set CKSN/KSI as invalid. Updated when RRC connection is released. Fixed by the operator. Stored on SIM/USIM.
Updating the START Value START' = MSB20 ( MAX {COUNT-C, COUNT-I | radio bearers and signalling radio bearers using the most recently configured CK and IK}) + 2 Once updated, it is saved into SIM/USIM and deleted from the mobile
Counter Check Procedure Check does not involve Core Network Prevent “man-in-the-middle” attacks RRC will query RLC for COUNT-C values RRC will include mismatches in its response UTRAM may release RRC connection
Indicating Current CKSN/KSI This field is indicated by UE MM/GMM in the following messages: LOCATION UPDATING REQUEST CM SERVICE REQUEST PAGING RESPONSE CM RE-ESTABLISHMENT REQUEST This field is indicated by UE GMM in the following messages: ROUTING AREA UPDATE REQUEST SERVICE REQUEST ATTACH REQUEST
Deriving Ciphering and Integrity Counters START (20 bits) USIM RRC RLC-TM RLC-UM RLC-AM
Ciphering Data
Data Integrity Additional protection within the same authentication session
Transmission of Signalling Content Signalling Content RRC SN MAC Message f9 MAC Signalling Content RRC SN RB ID Message f8 Signalling Content RRC SN MAC Message
Integrity Exceptions Integrity is not applied for: HANDOVER TO UTRAN COMPLETE PAGING TYPE 1 PUSCH CAPACITY REQUEST PHYSICAL SHARED CHANNEL ALLOCATION RRC CONNECTION REQUEST RRC CONNECTION SETUP RRC CONNECTION SETUP COMPLETE RRC CONNECTION REJECT RRC CONNECTION RELEASE (CCCH only) SYSTEM INFORMATION SYSTEM INFORMATION CHANGE INDICATION TRANSPORT FORMAT COMBINATION CONTROL (TM DCCH only)
Generating the Quintet
USIM Security Execution Resynchronization procedure exists in the USIM and HLR/AuC Secret Key
AKA for GSM Subscribers 3G phone with GSM SIM connecting to UTRAN 3G phone with GSM SIM connecting to GSM
AKA for UMTS Subscribers 2G phone with USIM connecting to GSM & R98- VLR/SGSN 3G phone with USIM connecting to GSM & R98- VLR/SGSN
Security Service Summary
GSM Handover Intra-BSC HO Nothing to be done Inter-BSC & Intra-MSC HO BSC informs MSC that HO is required MSC commands target BSC and passes on security context Inter-MSC HO Same as above except that current MSC informs target MSC to initiate HO to target cell
UMTS to GPRS Cell Reselection
Algorithmic Background – Cipher Types Symmetric cipher: shared secret key Stream cipher (OTP) Block cipher (DES, Triple-DES, AES, RC2) Block ciphers can be used as stream ciphers Modes of operation:  ECB, CBC, PCBC, CFB, OFB, CTR E/D E/D
Algorithmic Background – Cipher Types Asymmetric cipher (Diffie-Hellman, RSA, DSA, ECC-based ciphers) Private key Public key One-way hash (MD5, SHA-1, SHA-2, Triple-DES) E D H
GSM Security Flaws – 1 Weak algorithms – cracked long ago COMP128 was used: this is a keyed hash function generating a 96 bit digest Fault with operators in using COMP128 A3 and A8 based on COMP128 Kc is only 54 bits COMP128-2, COMP128-3 developed but these are not public:  Security Through Obscurity  just doesn’t work Stream ciphers A5/1 and A5/2 cracked in 1999 in hours: A5/3 used KASUMI In 2002, IBM developed new methods to crack Kc: using side channels, can crack in only 8 queries! COMP128-4 is based on AES
GSM Security Flaws – 2 Same basic algorithm is used to generate both SRES and Kc No integrity on signalling data No network authentication Encryption does not extend far into the network Microwave links not protected by operators – Kc could be read easily
UMTS Algorithms KASUMI Design authority: ETSI SAGE Based on the block cipher MISTY (Mitsubishi) KASUMI is the Japanese for “MIST” f8 and f9 are based on KASUMI Changes made to aid hardware implementation Keys are 128 bits long No known hacks exist
Comparing GSM & UMTS 1.  A5/3 AND GEA3 are based on KASUMI Yes No Integrity Synchronization & Key Reuse Activation Ciphering inputs Algorithms & Converters AuC Generated Vectors KSI, START CKSN ActivationTime Immediate/ Handshaking CK, RB ID, COUNT-C, DIRECTION GSM: Kc, COUNT, slot number GPRS: Kc, LLC-based INPUT, DIRECTION VBS/VGCS: group key no. f1, f2, f3, f4, f5, f6, f7, f8, f9, f10, f1*, f5*, c1, c2, c3 A3, A5/[1,2,3] 1 , GEA[1,2,3]  1 , A8, c4, c5 (RAND,XRES,CK,IK,AUTN): quintet (RAND,SRES,Kc): triplet 3G GSM/GPRS
Implementation Challenges Hardware Or Software ? Rarely matters at the network end. Matters a lot to the mobile.
Performance of f8 and f9 - 1
Performance of f8 and f9 - 2
SW Optimization of f8 and f9 Convert 16-bit to 32-bit operations on ARM Single instruction instead of 2 or 4 15% faster Using non-static memory for sub-keys Avoid ARM’s LDR instruction Use structures and pass pointers to functions 5% faster Key scheduling only when CK and IK change 3.5 KB increased memory 60% faster Optimizing FI with table lookups Not recommended since memory usage increases by 256 KB Estimated to give 50% improvement in the best case if tables are cached but not practical
End-to-End Security Beyond the scope of cellular systems IPSec Firewall VPN Public Key Infrastructure (PKI) & Digital Certificates MAC on files for download
Conclusion Current GSM networks are far more secure than early ones UMTS improves on GSM security Inter-working between UMTS and GSM still has implementation issues Constant innovation – anything secure today is not likely to be secure tomorrow User has the responsibility to protect his/her SIM/USIM
Standards (Release 99) Technical specifications TS 21.133 Security threats and requirements TS 22.022  Personalisation of Mobile Equipment (ME) TS 33.102 Security architecture TS 33.103 Integration guidelines TS 33.105 Cryptographic algorithm requirements TS 33.106 Lawful interception requirements TS 33.107 Lawful interception architecture TS 33.120 Security principles and objectives TS 35.20x Access network algorithm specifications Technical reports TR 33.900 Guidelines for 3G security TR 33.901 Criteria for algorithm design TR 33.902 Formal analysis of authentication

More Related Content

PPTX
TS31103 ISIM introduction
PDF
Understanding Telecom SIM and USIM/ISIM for LTE
PDF
SIM Card Overview
PDF
CellSIM OS Overview 1.0
PDF
Introduction to SIM and USIM
PDF
SmartTrust WIB 1.3
DOCX
clone sim card
PDF
eSIM for consumers - a game changer in mobile telecommunications
TS31103 ISIM introduction
Understanding Telecom SIM and USIM/ISIM for LTE
SIM Card Overview
CellSIM OS Overview 1.0
Introduction to SIM and USIM
SmartTrust WIB 1.3
clone sim card
eSIM for consumers - a game changer in mobile telecommunications

What's hot (20)

PDF
Programmable SIM cards, SoftSIMs and eSIMs
PPTX
Sim cards
PDF
IoT eSIM Test Bed
PDF
Lp 2010 operation-theory
PPT
Presentation
PPTX
Mobile Phone and SIM card cloning
PDF
The T.E.E. + eSIM Dual Roots of Trust
PDF
Developing Smart Card Web Server Applications
PDF
Rivetz - A blockchain smartphone's secret sauce
PDF
The mobile evolution of the employee and student pass
PDF
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
DOCX
Sdfgh
PDF
Internet2 National Video Conferencing Service: Getting ...
PDF
Assurity seminar 24 jan
PDF
Apresentação Técnica - Infecções por Malware no Brasil
PPTX
What UICC Means for NFC & Security
PDF
Cloud based Anti-Theft Application for Android Devices: A Literature Review
PDF
Rfid based automated bank locker system
PDF
Cellnetrix brochure 2013
PPTX
Final year project proposal
Programmable SIM cards, SoftSIMs and eSIMs
Sim cards
IoT eSIM Test Bed
Lp 2010 operation-theory
Presentation
Mobile Phone and SIM card cloning
The T.E.E. + eSIM Dual Roots of Trust
Developing Smart Card Web Server Applications
Rivetz - A blockchain smartphone's secret sauce
The mobile evolution of the employee and student pass
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Sdfgh
Internet2 National Video Conferencing Service: Getting ...
Assurity seminar 24 jan
Apresentação Técnica - Infecções por Malware no Brasil
What UICC Means for NFC & Security
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Rfid based automated bank locker system
Cellnetrix brochure 2013
Final year project proposal
Ad

Viewers also liked (20)

PDF
Introduction To Cellular Networks
PPTX
CELLULAR COMMUNICATION SYSTEM
PDF
Overview of FreeBSD PMC Tools
PDF
Kc Hotel Information System Request Form
PDF
Service Request Management System
PDF
UMTS/LTE/EPC Call Flows for Handovers
PDF
Cellular Architecture Design Concepts
PPTX
NSN NOKIA 3G KPI for Network planning and optimization
PPT
Huawei parameter strategy v1.4 1st dec
DOCX
Feasibility report
PPT
Lec 3 and 4 cellular concept 1
PPT
Umts Kpi
PPT
Cellular network
PDF
Lte security overview
PDF
Doing Terrifying Things - Nati Cohen, Similarweb - DevOpsDays Tel Aviv 2016
PDF
Evolucija Klijenata
PDF
AWSome Day Berlin 18.6.2014
PDF
Мобилната реклама - Ефективност през таргетиране
PPT
Facebook rinkodara Lietuvos elektroniniams verslams
KEY
JavaScript Craftsmanship: Why JavaScript is Worthy of TDD
Introduction To Cellular Networks
CELLULAR COMMUNICATION SYSTEM
Overview of FreeBSD PMC Tools
Kc Hotel Information System Request Form
Service Request Management System
UMTS/LTE/EPC Call Flows for Handovers
Cellular Architecture Design Concepts
NSN NOKIA 3G KPI for Network planning and optimization
Huawei parameter strategy v1.4 1st dec
Feasibility report
Lec 3 and 4 cellular concept 1
Umts Kpi
Cellular network
Lte security overview
Doing Terrifying Things - Nati Cohen, Similarweb - DevOpsDays Tel Aviv 2016
Evolucija Klijenata
AWSome Day Berlin 18.6.2014
Мобилната реклама - Ефективност през таргетиране
Facebook rinkodara Lietuvos elektroniniams verslams
JavaScript Craftsmanship: Why JavaScript is Worthy of TDD
Ad

Similar to Securing Wireless Cellular Systems (20)

PPTX
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
PPT
Security in GSM(2G) and UMTS(3G) Networks
PPT
Switching systems lecture7
PDF
Mobile Networks Architecture and Security (2G to 5G)
PDF
CSI Mobile Workshop CSICC 20222457846.pdf
PPTX
Gsm security and encryption
PPTX
Mobile Networks Overview (2G / 3G / 4G-LTE)
PPT
Rk 3 gsm network
PPT
Rk 3 gsm network @guddu
PPT
Cdma presentation
PPT
Cdma presentation
PPT
Cdma presentation
PPT
GSM Architecture.ppt
PPT
PPTX
Basic of teleom gsm
PDF
GSM Module
PPT
Full gsm overview (modified)
PDF
International Journal of Engineering Research and Development
PDF
02 gsm hscsd_gprs
PPT
2-1.pptggggggggggggggggggggggggggggggggtt
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
Security in GSM(2G) and UMTS(3G) Networks
Switching systems lecture7
Mobile Networks Architecture and Security (2G to 5G)
CSI Mobile Workshop CSICC 20222457846.pdf
Gsm security and encryption
Mobile Networks Overview (2G / 3G / 4G-LTE)
Rk 3 gsm network
Rk 3 gsm network @guddu
Cdma presentation
Cdma presentation
Cdma presentation
GSM Architecture.ppt
Basic of teleom gsm
GSM Module
Full gsm overview (modified)
International Journal of Engineering Research and Development
02 gsm hscsd_gprs
2-1.pptggggggggggggggggggggggggggggggggtt

More from ACMBangalore (16)

PDF
The power of abstraction
PPTX
Lesson from Building a Search Engine using the cloud
PDF
Automated Design of Digital Microfluids Lab-on-Chip
PPT
Social Network Analysis (SNA) and its implications for knowledge discovery in...
PDF
Opening Remarks - Cloud Symposium
PDF
Clouds in emerging markets
PDF
Opportunites and Challenges in Cloud COmputing
PDF
Perspectives on Cloud COmputing - Google
PDF
Making of a Successful Cloud Business
PDF
Web Business Platforms on the Cloud
PDF
Badrinath Ramamurthy Cloud Infrastructure
PDF
market oriented cloud
PDF
Case study - SaaS Abs Experience Jan07 09
PDF
cloud - internet rengineering
PDF
virtualization tutorial at ACM bangalore Compute 2009
PDF
ACM Bangalore Distinguished Speaker Program
The power of abstraction
Lesson from Building a Search Engine using the cloud
Automated Design of Digital Microfluids Lab-on-Chip
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Opening Remarks - Cloud Symposium
Clouds in emerging markets
Opportunites and Challenges in Cloud COmputing
Perspectives on Cloud COmputing - Google
Making of a Successful Cloud Business
Web Business Platforms on the Cloud
Badrinath Ramamurthy Cloud Infrastructure
market oriented cloud
Case study - SaaS Abs Experience Jan07 09
cloud - internet rengineering
virtualization tutorial at ACM bangalore Compute 2009
ACM Bangalore Distinguished Speaker Program

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
Empathic Computing: Creating Shared Understanding
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
Modernizing your data center with Dell and AMD
Per capita expenditure prediction using model stacking based on satellite ima...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Securing Wireless Cellular Systems

  • 1. Securing Wireless Cellular Systems Arvind Padmanabhan [email_address] 9 th May 2009
  • 2. Contents Scope Cellular Basics Security Goals Elements of Security Protocol Procedures Algorithmic Background GSM Flaws & Solutions Implementation Challenges Conclusion References
  • 4. Cellular Basics – Network Architecture GSM MS SS7 BTS BSC MSC VLR HLR AuC GMSC BSS PSTN NSS A E C D PSTN Abis B H MS IP GPRS MS PSDN Gi SGSN Gr Gb Gs GGSN Gc Gn UMTS UE Node B RNC RNS Iub IuCS ATM IuPS
  • 5. Cellular Basics – GSM Protocol Stack Control Plane MS BTS BSC MSC/VLR
  • 6. Cellular Basics – GPRS Protocol Stack Control Plane
  • 7. Cellular Basics – UMTS Protocol Stack Control Plane
  • 8. Security Threats Eavesdropping Spoofing – mobile phishing Denial of service Hacking into Core Network Theft of SIM Theft of mobile phone Employees, partners, sub-contractors Viruses, worms, trojans
  • 9. Security Goals User identity confidentiality User location confidentiality User untraceability User authentication Network authentication Data confidentiality Data integrity Algorithm and key agreement Mobile equipment identification User-to-USIM authentication USIM-Terminal authentication
  • 10. Security Contexts User-SIM context Air interface context RAN-CN context CN context Authentication context Application context
  • 11. What is AKA? AKA is also known as Authentication and Key Agreement Network authenticates the subscriber Subscriber authenticates the network (not in GSM) Both parties agree on the keys to use for data confidentiality and data integrity USIM AuC
  • 12. GSM AKA A3 Mobile Station Radio Link GSM Operator A8 A5 A3 A8 A5 K i K i K c K c SIM Authentication: are SRES values equal? Challenge RAND m i Encrypted Data m i Signed response (SRES) SRES SRES F n F n
  • 14. Location Update Procedure Get CKSN from SIM Get Auth Vector from AuC Invoke SIM calculations Secure data exchange
  • 18. Change of Location Area User Identity Request User Identity Response Security context is transferred from the old VLR/SGSN to the new VLR/SGSN
  • 19. Authenticated Session Lifetime START < Yes Session is valid. Keys can be re-used. THRESHOLD No Keys have reached their end of life. Set START as invalid. Set CKSN/KSI as invalid. Updated when RRC connection is released. Fixed by the operator. Stored on SIM/USIM.
  • 20. Updating the START Value START' = MSB20 ( MAX {COUNT-C, COUNT-I | radio bearers and signalling radio bearers using the most recently configured CK and IK}) + 2 Once updated, it is saved into SIM/USIM and deleted from the mobile
  • 21. Counter Check Procedure Check does not involve Core Network Prevent “man-in-the-middle” attacks RRC will query RLC for COUNT-C values RRC will include mismatches in its response UTRAM may release RRC connection
  • 22. Indicating Current CKSN/KSI This field is indicated by UE MM/GMM in the following messages: LOCATION UPDATING REQUEST CM SERVICE REQUEST PAGING RESPONSE CM RE-ESTABLISHMENT REQUEST This field is indicated by UE GMM in the following messages: ROUTING AREA UPDATE REQUEST SERVICE REQUEST ATTACH REQUEST
  • 23. Deriving Ciphering and Integrity Counters START (20 bits) USIM RRC RLC-TM RLC-UM RLC-AM
  • 25. Data Integrity Additional protection within the same authentication session
  • 26. Transmission of Signalling Content Signalling Content RRC SN MAC Message f9 MAC Signalling Content RRC SN RB ID Message f8 Signalling Content RRC SN MAC Message
  • 27. Integrity Exceptions Integrity is not applied for: HANDOVER TO UTRAN COMPLETE PAGING TYPE 1 PUSCH CAPACITY REQUEST PHYSICAL SHARED CHANNEL ALLOCATION RRC CONNECTION REQUEST RRC CONNECTION SETUP RRC CONNECTION SETUP COMPLETE RRC CONNECTION REJECT RRC CONNECTION RELEASE (CCCH only) SYSTEM INFORMATION SYSTEM INFORMATION CHANGE INDICATION TRANSPORT FORMAT COMBINATION CONTROL (TM DCCH only)
  • 29. USIM Security Execution Resynchronization procedure exists in the USIM and HLR/AuC Secret Key
  • 30. AKA for GSM Subscribers 3G phone with GSM SIM connecting to UTRAN 3G phone with GSM SIM connecting to GSM
  • 31. AKA for UMTS Subscribers 2G phone with USIM connecting to GSM & R98- VLR/SGSN 3G phone with USIM connecting to GSM & R98- VLR/SGSN
  • 33. GSM Handover Intra-BSC HO Nothing to be done Inter-BSC & Intra-MSC HO BSC informs MSC that HO is required MSC commands target BSC and passes on security context Inter-MSC HO Same as above except that current MSC informs target MSC to initiate HO to target cell
  • 34. UMTS to GPRS Cell Reselection
  • 35. Algorithmic Background – Cipher Types Symmetric cipher: shared secret key Stream cipher (OTP) Block cipher (DES, Triple-DES, AES, RC2) Block ciphers can be used as stream ciphers Modes of operation: ECB, CBC, PCBC, CFB, OFB, CTR E/D E/D
  • 36. Algorithmic Background – Cipher Types Asymmetric cipher (Diffie-Hellman, RSA, DSA, ECC-based ciphers) Private key Public key One-way hash (MD5, SHA-1, SHA-2, Triple-DES) E D H
  • 37. GSM Security Flaws – 1 Weak algorithms – cracked long ago COMP128 was used: this is a keyed hash function generating a 96 bit digest Fault with operators in using COMP128 A3 and A8 based on COMP128 Kc is only 54 bits COMP128-2, COMP128-3 developed but these are not public: Security Through Obscurity just doesn’t work Stream ciphers A5/1 and A5/2 cracked in 1999 in hours: A5/3 used KASUMI In 2002, IBM developed new methods to crack Kc: using side channels, can crack in only 8 queries! COMP128-4 is based on AES
  • 38. GSM Security Flaws – 2 Same basic algorithm is used to generate both SRES and Kc No integrity on signalling data No network authentication Encryption does not extend far into the network Microwave links not protected by operators – Kc could be read easily
  • 39. UMTS Algorithms KASUMI Design authority: ETSI SAGE Based on the block cipher MISTY (Mitsubishi) KASUMI is the Japanese for “MIST” f8 and f9 are based on KASUMI Changes made to aid hardware implementation Keys are 128 bits long No known hacks exist
  • 40. Comparing GSM & UMTS 1. A5/3 AND GEA3 are based on KASUMI Yes No Integrity Synchronization & Key Reuse Activation Ciphering inputs Algorithms & Converters AuC Generated Vectors KSI, START CKSN ActivationTime Immediate/ Handshaking CK, RB ID, COUNT-C, DIRECTION GSM: Kc, COUNT, slot number GPRS: Kc, LLC-based INPUT, DIRECTION VBS/VGCS: group key no. f1, f2, f3, f4, f5, f6, f7, f8, f9, f10, f1*, f5*, c1, c2, c3 A3, A5/[1,2,3] 1 , GEA[1,2,3] 1 , A8, c4, c5 (RAND,XRES,CK,IK,AUTN): quintet (RAND,SRES,Kc): triplet 3G GSM/GPRS
  • 41. Implementation Challenges Hardware Or Software ? Rarely matters at the network end. Matters a lot to the mobile.
  • 42. Performance of f8 and f9 - 1
  • 43. Performance of f8 and f9 - 2
  • 44. SW Optimization of f8 and f9 Convert 16-bit to 32-bit operations on ARM Single instruction instead of 2 or 4 15% faster Using non-static memory for sub-keys Avoid ARM’s LDR instruction Use structures and pass pointers to functions 5% faster Key scheduling only when CK and IK change 3.5 KB increased memory 60% faster Optimizing FI with table lookups Not recommended since memory usage increases by 256 KB Estimated to give 50% improvement in the best case if tables are cached but not practical
  • 45. End-to-End Security Beyond the scope of cellular systems IPSec Firewall VPN Public Key Infrastructure (PKI) & Digital Certificates MAC on files for download
  • 46. Conclusion Current GSM networks are far more secure than early ones UMTS improves on GSM security Inter-working between UMTS and GSM still has implementation issues Constant innovation – anything secure today is not likely to be secure tomorrow User has the responsibility to protect his/her SIM/USIM
  • 47. Standards (Release 99) Technical specifications TS 21.133 Security threats and requirements TS 22.022 Personalisation of Mobile Equipment (ME) TS 33.102 Security architecture TS 33.103 Integration guidelines TS 33.105 Cryptographic algorithm requirements TS 33.106 Lawful interception requirements TS 33.107 Lawful interception architecture TS 33.120 Security principles and objectives TS 35.20x Access network algorithm specifications Technical reports TR 33.900 Guidelines for 3G security TR 33.901 Criteria for algorithm design TR 33.902 Formal analysis of authentication