360 likes | 769 Views
GSM Security and Encryption. Written by : David Margrave George Mason University Presented by : Halah Hassan Auckland University. “The security and authentication mechanisms incorporated in GSM make it the most secure mobile communication standard currently available…”.
E N D
GSM Security and Encryption Written by: David Margrave George Mason University Presented by: Halah Hassan Auckland University
“The security and authentication mechanisms incorporated in GSM make it the most secure mobile communication standard currently available…”
Presentation Layout • Introduction: • GSM system vs analogue-based system. • Cryptography: • Symmetric algorithms. • One-way hash function. • GSM Security Features: • Authentication • Signaling and data confidentiality. • Subscribers identity confidentiality. • GSM Cloning • Update- new informationabout GSM system from new articles that have been released. • Conclusion
Introduction • GSM – Group Special Mobile • The enhanced features of GSM over older analogue-based systems are : • Mobility • High capacity • Security • Service
Cryptography • Symmetric algorithm • Encryption and decryption use the same key. • C = Ex (P) P = Dx (C) P = Dx (Ex (P)) Where: C=cipher text P=plaintext E=encryption D=decryption x=key • GSM doesn’t use public key algorithm.
Cryptography • One-Way Hash Functions • A number is generated from a string of text. • Number is smaller than text. • Encrypts both the hash and message. • Decrypts the message and hash, and computes the hash of the original message again. • If both the send and computed hash values are the same then the receiver can be sure that the message was not tampered with.
GSM Security Features • Security features in the GSM network • SIM & AUC : A8, A3, Ki – individual authentication key, IMSI - international mobile subscriber identity SIM : Subscriber identity module. AUC: Authentication centre. A5, TSMI/IMSI/kc A3, A8, IMSI, Ki AUC A5 SIM RAND, SERS, kc HLR MSC MS RAND, SERS, kc A3, A8, IMSI, Ki, TMSI/LAI, kc BS VLR
GSM Security Features • Authentication: • A3 : take in 2 inputs of 128-bits and produces the SRES ( 32-bits). • Ki is never transmitted over the radio channel. • SRES is calculated over both sides, if they both give the same results, then authentication is successful. 128-bits RAND SRES = A3ki[RAND] SRES = A3ki[RAND] 32-bits MS BS 128-bits = ? No Authentication successful
GSM Security Features • Signaling and Data Confidentiality • Subscriber Identity Confidentiality. • After authentication and encryption is done, a TMSI is sent to the mobile. RAND kc = A8ki[RAND] kc = A8ki[RAND] MS BS A5 algorithm A5 algorithm Data Data
GSM Cloning • Query the SIM on a special-chosen challenges. • SIM applies the COMP128 to its secret key& chosen challenge. • COMP128 is a combination of both A3 and A8 algorithm. • Takes in RAND and Ki and gives a 128-bit output, SRES = 32-bits and Kc = 54-bits. • Analyse the response, to figure out the secret key.
Details of the attack • Will need • Physical access to the target SIM card. • Smart card reader. • Computer to direct the operation. • Need to query the smart card 150,000 times. • Smart card can issue 6.25 queries/sec. • Whole attack takes around 8 hours.
Currently • Its been proven possible to achieve an over-air-attack. • COMP128 algorithm has leaked to the public and it is possible for any one to have access to the algorithm.
Conclusion • GSM has better security features than the old analogue-based system. • It is still true that GSM is the most secure mobile communication standard currently available. • BUT it is possible to attack the system in different ways – • Proof : GSM cloning has been achieved. • There are other methods not mentioned in the article.
Questions • Will cloning effect the subscribers: • Confidentiality ? • Integrity ? • Availability ? • Why do you think it is important to generate a new RAND number every time a connection is being established ?