Vous êtes sur la page 1sur 10

Security Algorithms for Mobile Networks

Privacy Requirements
1. Call Setup Information: Calling number,type of Service 2. Speech / Message: Eavesdropping 3. Data: 4. User Location: 5. User Identification:

6. Calling Patterns: Frequency of calling, financial transations

Theft Resistance Requirements


1. Clone Resistant Design: prevent compromise of the unique information. 2. Unique user Id: More than two users can use a MS 3. Unique MS Id: Uniquely identifies a stolen MS

2G: GSM Systems


GSM Global System for Mobile Communications
1. Operates at 900 MHz and 1800 MHz. 2. Uses TDMA technology to divide bandwidth.

3. High mobility, reachability.


4. Integrated Security mechanisms - Encryption of transmitted data

- Authentication (PIN, SIM etc)


- Temporary Identification (pseudonyms)

GSM: Security Model


Based on a shared secret key between HLR and SIM card of subscriber called Ki, (128 bit).
Stored in the SIM card of the subscriber and at the Authentication Center of MSC. The key is used for authentication and generation of the session key used for encryption of data over the air channel.

GSM: Authentication Algo. A3


A3 implemented in SIM and Authentication center: 1. MSC sends a 128-bit random number (RAND) to MS. 2. 128 bits RAND and 128 bits Ki given as input to A3 which gives a 32 bit Signed Response (SRES). 3. MS sends back SRES which is compared with SRES generated at MSC.

GSM: Session Key Generation Algo. A8


Session key Kc is generated from RAND and Ki.

Kc is 64 bits key used to encrypt over the air channel.


Both SIM and AuC run A8 algorithm and generate Kc. Same session key used until MS is authenticated again

GSM: Encryption Algo. A5


It is a symmetric stream cipher algorithm which is run for every frame sent.
It is initialized with the session key Kc and the frame number being encrypted/decrypted. Inputs: 64 bit Kc, 22 bit frame number. Output 114 bit key block. This key block is XORed with the 114 bit voice stream and the result is sent over the air.

GSM: Algorithm Implementation


Moblie Station Base Station (BS)

Guest - MSC

Home -MSC

SIM AUC
RAND

BS -Controller

Random Generator

SRES

A3
Ki

Ki

A8
Kc

A8

A5
HLR Kc

A5
Encrypted radio transmission Non-encrypted directed radio transmission Non -encrypted transmission by wire

GSM: Flaws in the Security Model


The problems in GSM security model stem by and large from the design limitations on what is protected rather than defects in security mechanisms themselves.
1. Active attacks using a "false base station" are possible. 2. Cipher keys and authentication data are transmitted in clear between and within networks. 3. Ecryption does not extend far enough towards the core network resulting in the cleartext transmission of user and signalling data across microwave links (in GSM, from the BTS to the BSC). 4. Lack of confidence in cryptographic algorithms.

Vous aimerez peut-être aussi