Authentication and Security in Mobile Phones
|
|
|
- Alban Berry
- 10 years ago
- Views:
Transcription
1 Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after incidents such as Squidgy in the U.K. and eavesdropping on Newt Gingrich s calls in the U.S.. Cellphone fraud accounted for approximately US$750M in lost revenue in North America in Authentication and security in cellular phones are therefore important issues, and there is existing and ongoing efforts both in the United States and Europe. This paper provides an introduction to these facilities. Introduction Security and authentication features were rudimentary in the original analog cellular phones. This led to a strong industry performing cellular phone fraud. In 1996 this industry cost the legitimate service providers some US$750M in revenue in the United States alone, which represented approximately 3% of total industry revenue. [ctia] Authentication and security in cellular phones are therefore important issues, and there is existing and ongoing work both in the United States and Europe. Second generation phones have attempted to address the authentication problem, and to a lesser extent the security and privacy problems. The reason for this ordering is simply that authentication is linked to revenue, while at the moment customers are generally unwilling to pay for security and privacy. The original cellular phone standard is colloquially known as AMPS (Analog Mobile Phone Standard). The second generation analog standard is, not surprisingly, called NAMPS (New AMPS). There are also a number of different digital standards. Australia uses GSM (Groupe Speciale Mobile), developed in Europe, while the U.S. has two competing standards, TDMA and CDMA (Time and Code (resp) Division Multiple Access). TDMA is similar in concept to GSM, but very different in detail, while CDMA is radically different being a spread spectrum system. Note: The term PCS (Personal Communication System) is often thought of as a different type of cellular system. Really the only difference between PCS and Cellular communication is the frequencies used. Cellular systems operate in the MHz band, while PCS is in the GHz band. There are PCS versions of the digital standards, but not for analog. All of the cryptographic content of the various standards is based on secret key technology. The main reasons for this are: the processors in phones, and particularly for GSM as will become evident, are quite limited. 1
2 air bandwidth for call setup argues for short messages, while public key systems tend to send large chunks of data around. This may change in the next few years, or it may not. Public Key technology based around Elliptic Curves along with faster processors may alleviate these problems. As far as the authentication and security infrastructure goes, the new standards fall into two groups; GSM stands alone, while the various U.S. standards share quite a lot of infrastructure and architecture. Since the standard which defines the common infrastructure was called the ANSI accredited TIA IS-41 standard [is41] these are commonly called IS-41 systems, even though the standard has subsequently been accredited by ANSI. In the following discussion I will use the IS-41 name for anything which has an analog in GSM. At the time of writing, third generation standards are being developed. The new European standard is called UMTS; the international standard is called IMT-2000, and will probably incorporate both UMTS and future US-developed standards. Where decisions have been made in these efforts, they will be noted below. Keys At the top level, both systems have a master key, called the A-Key in IS-41. This is 64 bits (IS-41), or 128 bits (GSM). (In future, all keys in both systems will be 128 bits.) This is used for authentication of the mobile, and for generation of subkeys. In GSM, the top level key is used to generate authentication signatures (64 bits) and session keys (64 bits) directly. In IS-41, intermediate keys called Shared Secret Data are generated. There is an SSD-A which is used in authentication signatures, and an SSD-B which is used for cryptographic key generation. These are each 64 bits. There are also three session keys generated from SSD-B: The CMEAkey (64 bits) The Voice Privacy Mask (520 bits) The DataKey (32 bits) 2
3 SSD-A A-key CAVE SSD-B Figure 1 - generation of Shared Secret Data in IS-41. Details of the algorithms which use these various keys appear below. Figure 1 shows the manner in which the various keys are generated in IS-41. The inputs from the mobile phone are things like the Equipment Serial Number and software revision. The network broadcasts a random number, which is also input to the algorithm. Authentication Signatures Before allowing a mobile phone to access the network, the phone must present a response to a challenge, based on the SSD-A (IS-41) or the master key (GSM). In IS-41 the phone itself contains the secret key, and the algorithm (CAVE) which is used to calculate the signature. CAVE is detailed in an export-controlled appendix to the standard, and hence is standardised in all the phones. Figure 2 details the signature calculation process. SSD-A CAVE Figure 2 - IS-41 authentication signature calculation. 3
4 Note that, for originating a call, the phone number is also input to the algorithm. This is because the random challenge is broadcast and changes regularly, instead of being unique to the origination. This saves message overhead both over the air and within the network. The output from CAVE is truncated to 18 bits, meaning that there is about 1 chance in ¼ million of faking a call by sending a random signature. At these odds, I would invest in the lottery. The shared secret data can be sent to the visited system while roaming, allowing local authentication. If encryption is supported, the various privacy keys are generated soon afterward. CAVE is a hashing algorithm which works by using a shift register driven walk over the input data and a somewhat random table, and shuffling the inputs. It takes 23 octets of input and produces 16 octets of output. Future IS-41 systems will replace most of the functionality of CAVE with SHA-1, the US FIPS Secure Hash Standard. In GSM, the picture is quite different, although conceptually similar. The challenge is unique, and is generated within the home system (the system where the phone is registered). The algorithm and the master key are both stored on a smart card called a SIM (Subscriber Identity Module). This allows for the possibility that the algorithm may actually vary with different service providers, and indeed this is the case for about 40% of phones. The interface to which the algorithm adheres is called A3, and it accepts a 64 bit challenge and produces a 64 bit response, based on the secret key in the SIM. At the same time, an algorithm whose interface is called A8 calculates the corresponding session key for privacy during the call. The standard algorithm performing these functions together is called COMP128. This algorithm is held tightly secret by the GSM MoU (Memorandum of Understanding Group); only the interface to it is public. Because the algorithm might not even be known at a visited system, the home system has to perform all of the verification and key generation functions. As an optimisation for network traffic, a number of triplets are forwarded upon the first access. These consist of: 1. A challenge to be sent to the mobile station 2. The expected response 3. The session key to be used after authentication succeeds. Relying on the secrecy of the algorithm is rarely a good move, and indeed COMP128 was disclosed in Furthermore, the algorithm is weak, allowing disclosure of the A-Key with a few million interactions with the SIM card. The architecture for UMTS is largely settled. The "triples" will be called the Authentication Vector, and have five elements. There are now two session keys, one for privacy and one for message origin authentication (MAC). The fifth element authenticates the network to the mobile; combined with freshness guarantees, this prevents any form of man-in-the-middle attacks. Encryption for secrecy in GSM In GSM the situation for secrecy of voice, signaling data and user data is simple. Once the session has been authenticated, encryption is turned on and everything is protected by the same algorithm, a stream cipher notionally known as A5. Actually, there are three different 4
5 algorithms, which are negotiated between the phone and the network. A5/1 is based on three shift registers with complicated stepping control, similar to the algorithm mentioned in Schneier [sch96] but not quite. The exact algorithm was reverse engineered early in A5/2 is a weakened version of A5/1, in which the stepping is controlled by a fourth independent shift register. There is also the option of no encryption, colloquially called A5/0. The first two of these algorithms are also tightly controlled by the GSM MoU. Unlike the A3/A8 algorithm(s), though, these ones are built into the phone itself, because the SIM doesn t have enough CPU power to calculate the outputs in real time. Encryption for secrecy in IS-41 In the U.S. standards the situation is much more complicated. Voice privacy AMPS, NAMPS none at all. TDMA a fixed voice privacy mask is XORed with the digitised voice. Cryptographically insecure. CDMA most of the voice privacy mask is ignored, but the last 42 bits are used as an offset for the output of a linear feedback shift register. Cryptographically this is also not very strong, but this output is used as a spreading code for the spread spectrum transmission. This means that, without knowing the code in advance, it is difficult to even sort out the signal from the background noise. Signaling data privacy Data such as numbers dialed, short messages (paging), and DTMF tones are put into data packets and are encrypted using CMEA (Cellular Message Encryption Algorithm). This is a variable length block cipher, which works by a table walk using a key-derived somewhat random table, a self-inverse folding and the inverse of the first step. This makes the algorithm itself self-inverse, which isn t such a hot idea in retrospect. The cipher is used in ECB (Electronic Code Book) mode, ditto. The packet formats differ for the three standards, but the algorithm is the same. CMEA has been broken [wag97]. A short term drop-in replacement has been proposed and adopted, but is not yet widely deployed. Data encryption A stream cipher called ORYX (not an acronym, but upper case anyway) is used for data encryption. It has three Galois configuration linear feedback shift registers, one of which steps normally, and controls the other two; one of these steps according to two different polynomials; the other steps once or twice per byte. The high bytes are passed through a lookup table and combined to form one octet of the output mask. The key length is intentionally very short, for export purposes. ORYX has also been broken. Future development There is a long term plan to replace the architecture in IS-41 so that hopefully there won t be so many different algorithms in use. New algorithms in IS-41 will be strong, publicly 5
6 scrutinised algorithms. In the short term both CMEA and ORYX are being replaced with a strengthened version of CMEA. [ctia] [is41] [sch96] [wag97] Cellular Telecommunications Industry Association, exerpt from confidential report, June TIA IS-41C, Telecommunications Industry Association, B. Schneier, Applied Cryptography, Second edition, Wiley 1996 B. Schneier, J. Kelsey and D. Wagner, Cryptanalysis of the Cellular Message Encryption Algorithm, Proc. Crypto 97. 6
Development of Wireless Networks
Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England
TETRA Security TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England www.tetramou.com February 2006 TETRA Security Page 2 of 2 1 The TETRA security functions TETRA contains
Chapters 1-21 Introduction to Wireless Communication Systems
Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova
GSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Mobile Communications TCS 455
Mobile Communications TCS 455 Dr. Prapun Suksompong [email protected] Lecture 26 1 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30 Announcements Read the following from the SIIT online
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
Wireless Cellular Networks: 1G and 2G
Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available
How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/[email protected] TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Wireless Mobile Telephony
Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail Professor Patrick Traynor 9/27/12 Cellular Telecommunications Architecture Background Air Interfaces Network Protocols Application: Messaging
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
CS 8803 - Cellular and Mobile Network Security: CDMA/UMTS Air Interface
CS 8803 - Cellular and Mobile Network Security: CDMA/UMTS Air Interface Hank Carter Professor Patrick Traynor 10/4/2012 UMTS and CDMA 3G technology - major change from GSM (TDMA) Based on techniques originally
FIGURE 12-1 Original Advanced Mobile Phone Service (AMPS) frequency spectrum
FIGURE 12-1 Original Advanced Mobile Phone Service (AMPS) frequency spectrum FIGURE 12-2 Complete Advanced Mobile Phone Service (AMPS) frequency spectrum TABLE 12-1 AMPS Frequency Allocation TABLE 12-2
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
MOBILE COMMUNICATION SYSTEMS AND SECURITY
MOBILE COMMUNICATION SYSTEMS AND SECURITY Man Young Rhee Endowed Chair Professor Kyung Нее University, Republic of Korea IEEE IEEE PRESS IEEE Communications Society, Sponsor John Wiley & Sons (Asia) Pte
ETSI ETR 278 TECHNICAL March 1996 REPORT
ETSI ETR 278 TECHNICAL March 1996 REPORT Source: ETSI TC-SAGE Reference: DTR/SAGE-00014 ICS: 33.020 Key words: GSM, cipher algorithm Security Algorithms Group of Experts (SAGE); Report on the specification
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Wireless Security: Token, WEP, Cellular
Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1 Topics for Today Security
Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.
Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)
Cellular Networks: Background and Classical Vulnerabilities
Cellular Networks: Background and Classical Vulnerabilities Patrick Traynor CSE 545 1 Cellular Networks Provide communications infrastructure for an estimated 2.6 billion users daily. The Internet connects
Wireless Access of GSM
Wireless Access of GSM Project Report FALL, 1999 Wireless Access of GSM Abstract: Global System for Mobile communications (GSM) started to be developed by Europeans when the removal of many European trade
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Global System for Mobile Communication (GSM)
Global System for Mobile Communication (GSM) Definition Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization
Network Security - ISA 656 Introduction to Cryptography
Network Security - ISA 656 Angelos Stavrou September 18, 2007 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let
Security features include Authentication and encryption to protect data and prevent eavesdropping.
What is a SIM card? A SIM card, also known as a subscriber identity module, is a subscriber identity module application on a smartcard that stores data for GSM/CDMA Cellular telephone subscribers. Such
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Security Policy for Oracle Advanced Security Option Cryptographic Module
Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
How To Understand Cellular Communications
Definition Cellular Communications A cellular mobile communications system uses a large number of low-power wireless transmitters to create cells the basic geographic service area of a wireless communications
Security Evaluation of CDMA2000
Security Evaluation of CDMA2000 L. Ertaul 1, S. Natte 2, and G. Saldamli 3 1 Mathematics and Computer Science, CSU East Bay, Hayward, CA, USA 2 Mathematics and Computer Science, CSU East Bay, Hayward,
Network Security. A Quick Overview. Joshua Hill [email protected] http://www.untruth.org
Network Security A Quick Overview Joshua Hill [email protected] http://www.untruth.org Security Engineering What is Security Engineering? "Security Engineering is about building systems to remain dependable
Global System for Mobile Communications (GSM)
Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE [email protected] UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security
