On the Security of 3GPP Networks



Similar documents
UMTS security. Helsinki University of Technology S Security of Communication Protocols

Security Evaluation of CDMA2000

Security Architecture Standardization and Services in UMTS

GSM and UMTS security

ETSI TS V3.6.0 ( )

Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra

Mobile Phone Security. Hoang Vo Billy Ngo

Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

How To Understand The Gsm And Mts Mobile Network Evolution

Mobile Office Security Requirements for the Mobile Office

Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Evolution of GSM in to 2.5G and 3G

2G/3G Mobile Communication Systems

Mobile Communications

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

IMSI Catcher. Daehyun Strobel. 13.Juli Seminararbeit Ruhr-Universität Bochum. Chair for Communication Security Prof. Dr.-Ing.

Chapter 2 Mobility Management for GPRS and UMTS

Global System for Mobile Communication (GSM)

Security and Authentication Concepts

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

LTE Security How Good Is It?

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Delivery of Voice and Text Messages over LTE

Authentication and Security in IP based Multi Hop Networks

Mobile Network Security

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Global System for Mobile Communication Technology

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

2G Mobile Communication Systems

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

EDGE: The Introduction of High Speed Data in GSM / GPRS Networks

PDF vytvořeno zkušební verzí pdffactory UMTS

Overview of the Evolved packet core network

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

LTE Overview October 6, 2011

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

3GPP TSG SA WG3 Security S3#20 S November, 2001 Sophia Antipolis, France

TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England

3GPP TSG CN Plenary Meeting #16 5 th - 7 th June Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N Budapest, Hungary,

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Evolution from GSM to UMTS

Mobile network security report: Poland

Chapter 6 Wireless and Mobile Networks

2 System introduction

The GSM and GPRS network T /301

DoS Attacks Exploiting Signaling in UMTS and IMS

GSM Architecture Training Document

Mobility Management in UMTS

Performance Estimation of a SIP based Push-to-Talk Service for 3G Networks

introduction to femtocells

Security protocols of existing wireless networks

Security Analysis of LTE Access Network

Mobile Communication GSM, GPRS, EDGE, UMTS and beyond

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

ETSI TS V ( )

Security in cellular-radio access networks

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

An Example of Mobile Forensics

2G Cellular Data Networks

Mobile Wireless Overview

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

ETSI TS V5.1.0 ( )

Cellular Network Organization

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

GSM Network and Services

GSM BASICS GSM HISTORY:

Mobile Services (ST 2010)

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

GSM Risks and Countermeasures

IP Multimedia System: general aspects and migration perspectives

GPRS Overview. GPRS = General Packet Radio Service. GPRS Network

ETSI TS V6.5.0 ( )

Security in the GSM Network

Authentication and Authorization Applications in 4G Networks

Wireless Access of GSM

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Outsourcing and network sharing: key considerations to solve the backhaul challenge

Global System for Mobile Communications (GSM)

ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices

GSM Architecture and Interfaces

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA

Transcription:

On the Security of 3GPP Networks Michael Walker Vodafone AirTouch & Royal Holloway, University of London Chairman 3GPP SA3 - Security Eurocrypt 2000 Security of 3GPP networks 1

Acknowledgements This presentation is based on the technical specifications and reports produced by the members of 3GPP SA3 and ETSI SAGE available from http://www.3gpp.org Much of the back ground work was done as part of the EU funded ACTS project USECA the partners are Vodafone, G&D, Panasonic, Siemens Atea, Siemens AG & Katholieke Universiteit Leuven http://www.useca.freeserve.co.uk Eurocrypt 2000 Security of 3GPP networks 2

Principles for 3G Security Build on the security of GSM adopt the security features from GSM that have proved to be needed and robust try to ensure compatibility with GSM in order to ease inter-working and handover Correct the problems with GSM by addressing its real and perceived security weaknesses Add new security features as are necessary to secure new services offered by 3G to take account of changes in network architecture Eurocrypt 2000 Security of 3GPP networks 3

SIM SIM Building on GSM Security - Architecture UE USIM Cu USIM USIM Cu USIM ME ME ME ME Uu Uu BS BS AN CN External Networks BSS MT MT Um BTS Abis BSC A RNS Iub RNS Iub RNC Iur RNC Iu EIR EIR SCF SCF HLR HLR GMSC GMSC AUC AUC UTRAN Eurocrypt 2000 Security of 3GPP networks 4 Iu Gb MSC MSC E, G MSC MSC F Gf SGSN SGSN Gd, Gp, Gn+ SGSN SGSN Gr D SMS- SMS- IWMSC IWMSC Gn+ GGSN GGSN SMS- SMS- GMSC GMSC H Note: Not all interfaces shown and named ISDN PSTN PSPDN CSPDN PDN: -Intranet -Extranet -Internet

Building on GSM Security, 2 Remain compatible with GSM network architecture User authentication & radio interface encryption SIM used as security module removable hardware terminal independent management of all customer parameters Operates without user assistance Requires minimal trust in serving network Eurocrypt 2000 Security of 3GPP networks 5

Limitations of GSM Security Problems with GSM security stem by and large from design limitations on what is protected rather than on defects in the security mechanisms themselves only provides access security - communications and signalling in the fixed network portion aren t protected does not address active attacks, whereby network elements may be impersonated designed to be only as secure as the fixed networks to which they connect lawful interception only considered as an after thought Eurocrypt 2000 Security of 3GPP networks 6

Limitations of GSM Security, 2 Failure to acknowledge limitations encryption needed to guard against radio channel hijack the terminal is an unsecured environment - so trust in the terminal identity is misplaced Inadequate flexibility to upgrade and improve security functions over time Lack of visibility that the security is being applied no indication to the user that encryption is on no explicit confirmation to the home network that authentication is properly used when customers roam Eurocrypt 2000 Security of 3GPP networks 7

Limitations of GSM Security, 3 Lack of confidence in cryptographic algorithms lack of openness in design and publication of A5/1 misplaced belief by regulators in the effectiveness of controls on the export or (in some countries) the use of cryptography key length too short, but some implementation faults make increase of encryption key length difficult need to replace A5/1, but poor design of support for simultaneous use of more than one encryption algorithm, is making replacement difficult ill advised use of COMP 128 Eurocrypt 2000 Security of 3GPP networks 8

Specific GSM Security Problems Encryption terminated too soon user traffic and signalling in clear on microwave links Clear transmission of cipher keys & authentication values within and between networks signalling system vulnerable to interception and impersonation Confidence in strength of algorithms failure to choose best authentication algorithms improvements in cryptanalysis of A5/1 Use of false base stations Eurocrypt 2000 Security of 3GPP networks 9

Used as IMSI Catcher for law enforcement Used to intercept mobile originated calls encryption controlled by network and user unaware if it is not on Dynamic cloning risk in networks where encryption is not used False Base Stations Eurocrypt 2000 Security of 3GPP networks 10

3GPP Security Architecture Overview User Application IV. Provider Application Application stratum TE III. MT USIM I. I. I. I. AN SN/ VLR/ SGSN I. II. Transport stratum HE/AuC Home stratum/ Serving Stratum I. Network access security II. Provider domain security III. User domain security IV. Application security Eurocrypt 2000 Security of 3GPP networks 11

Authentication & Key Agreement (AKA) Protocol Objectives Authenticate user to network & network to user Establish a cipher key CK (128 bit) & an integrity key IK (128 bit) Assure user and network that CK/IK have not been used before Authenticated management field HE USIM authentication key and algorithm identifiers limit CK/IK usage before USIM triggers a new AKA Eurocrypt 2000 Security of 3GPP networks 12

AKA Prerequisites AuC and USIM share user specific secret key K message authentication functions f1, f1*, f2 key generating functions f3, f4, f5 AuC has a random number generator AuC has scheme to generate fresh sequence numbers USIM has scheme to verify freshness of received sequence numbers Eurocrypt 2000 Security of 3GPP networks 13

AKA Variables and Functions RAND = random challenge generated by AuC XRES = f2 K (RAND) = expected user response computed by AuC RES = f2 K (RAND) = actual user response computed by USIM CK = f3 K (RAND) = cipher key IK = f4 K (RAND) = integrity key AK = f5 K (RAND) = anonymity key SQN = sequence number AMF = authentication management field MAC = f1 K (SQN RAND AMF) = message authentication code computed over SQN, RAND and AMF AUTN = SQN AK AMF MAC = network authentication token, concealment of SQN with AK is optional Quintet = (RAND, XRES, CK, IK, AUTN) Eurocrypt 2000 Security of 3GPP networks 14

AKA Message Flow USIM VLR or SGSN AuC Distribution of quintets from HLR/AuC to VLR/SGSN auth. data request Generate Quintets quintets (RAND, XRES, CK, IK, AUTN) Verify MAC, SQN Derive CK, IK, RES RAND, AUTN RES Over-the-air authentication and key agreement XRES = RES? Start using CK, IK Start using CK, IK Eurocrypt 2000 Security of 3GPP networks 15

Length of AKA Cryptographic Parameters K 128 bits RAND 128 bits RES 32-128 bits CK 128 bits IK 128 bits AUTN 128 bits SQN Sequence number 48 bits AMF Authentication management field 16 bits MAC Message authentication code 64 bits Eurocrypt 2000 Security of 3GPP networks 16

Air-interface Encryption, 1 Applies to all user traffic and signalling messages Uses stream ciphering function f8 - with provision for different algorithms: UEA1 = Kasumi; UEA0 = no encryption COUNT-C DIRECTION BEARER LENGTH COUNT-C DIRECTION BEARER LENGTH CK f8 CK f8 KEYSTREAM BLOCK KEYSTREAM BLOCK PLAINTEXT BLOCK CIPHERTEXT BLOCK PLAINTEXT BLOCK Sender ME or RNC Receiver ME or RNC Eurocrypt 2000 Security of 3GPP networks 17

Air-interface Encryption, 2 Termination points user side: mobile equipment, network side: radio network controller Ciphering in layer 2 RLC sublayer non-transparent RLC mode (signalling, data) MAC sublayer transparent RLC mode (voice) Key input values to algorithm CK 128 bits Cipher key COUNT-C 32 bits Ciphering sequence number RLC sublayer HFN RLC (25/20)+ SN RLC (7/12) (SN RLC is transmitted) MAC sublayer HFN MAC (25) + CFN MAC (7) (CFN MAC is transmitted) Further input values BEARER 5 bits Bearer identity DIRECTION 1 bit Uplink/downlink LENGTH 16 bits Length of keystream block Eurocrypt 2000 Security of 3GPP networks 18

Air-interface Integrity Mechanism, 1 Applies to all except a specifically excluded signalling messages after connection and security mode set-up MS supervises that it is started Uses integrity function f9 - with provision for different algorithms: UIA1 = Kasumi COUNT- I DIRECTION MESSAGE FRESH COUNT- I DIRECTION MESSAGE FRESH IK f9 IK f9 MAC- I XMAC- I MESSAGE MAC- I MAC- I = XMAC- I? Sender ME or RNC Receiver ME or RNC Eurocrypt 2000 Security of 3GPP networks 19

Air-interface Integrity Mechanism, 2 Termination points user side: mobile equipment, network side: radio network controller Integrity protection: layer 2 RRC sublayer Key input values IK 128 bits Integrity key COUNT-I 32 bits Integrity sequence number consists of HFN RRC (28) + SN RRC (4) (SN RRC is transmitted) FRESH 32 bits Connection nonce MESSAGE Signalling message Further input values DIRECTION 1 bit Uplink/downlink Output values MAC-I/XMAC-I 32 bits message authentication code Eurocrypt 2000 Security of 3GPP networks 20

Connection Establishment Overview ME/USIM RNC VLR/SGSN 1. RRC Connection Establishment RRC 2. MM Initial L3 message MM 3. MM IMSI Interrogation MM 4. MM Authentication and key agreement MM 5. Security mode command RANAP 6. Security mode command RRC 7. RRC Security mode complete 8. RANAP Security mode complete 9. Response to initial L3 message MM 10. MM TMSI allocation MM Eurocrypt 2000 Security of 3GPP networks 21

Starting Ciphering & Integrity ME/USIM RNC VLR/SGSN 1. 2. 4. Connection Establishment START; UEA MS, UIA MS Initial L3 message CKSN Authentication and key agreement Decide AKA / No AKA 5. Security mode command UEA CN, UIA CN, CK, IK Start of integrity protection Start of ciphering/deciphering RNC selects UEA and UIA; start of integrity protection 6. Security mode command UEA, UIA, UEA MS, UIA MS (first integrity protected message) FRESH Start of ciphering/deciphering 7. Security mode complete (first ciphered message) Eurocrypt 2000 Security of 3GPP networks 22

Security Parameters & Choices START(32bits) initial hyperframe number used to initialise COUNT-C/I assures user MAC-I is fresh START stored/updated USIM CKSN(3 bits) cipher key sequence number indicates the key set that is stored in USIM when START exceeds a certain threshold, CKSN can be used to trigger a new AKA FRESH(32 bits) network nonce assures network MAC-I fresh AKA is performed when the user enters a new SN the user indicates that a new AKA is required when the amount of data ciphered with CK has reached a threshold the serving network decides Otherwise integrity-key based authentication Selection of UEA and UIA by user/user s home environment Eurocrypt 2000 Security of 3GPP networks 23

Network Domain Security Overview Network X Network Y Layer 1 KAC X Key establishment KAC Y Key distribution Layer 2 Layer 3 NE X (1) KAC = Key administration Centre NE = Network entity NE X (2) NE X (3) Transport security NE Y (1) NE Y (2) NE Y (3) Eurocrypt 2000 Security of 3GPP networks 24

Network Security Features, 1 Layer 1 - Key Establishment KAC X generates and stores asymmetric key pair for X, and stores public keys from other networks - exchanged as part of roaming agreement generates, stores and distributes symmetric session keys for securing information sent from entities in X receives and distributes symmetric session keys for securing information sent from other networks Session key transport to ISO/IEC 11770-3: Key Management - mechanisms using symmetric techniques Eurocrypt 2000 Security of 3GPP networks 25

Network Security Features, 2 Layer 2 - Key Distribution KAC X distributes session keys to nodes in X Layer 3 - Transport Security MAP signalling provided with encryption, origin authentication and integrity using standard symmetric techniques Protection limited to new messages in R 99 - includes authentication quintets Block cipher BEANO designed by ETSI SAGE for public network operators may be used Eurocrypt 2000 Security of 3GPP networks 26

Encryption & Integrity Algorithm Requirements Stream cipher f8 and integrity function f9 - parameters already described Low power, low gate-count hardware, as well as software No practical attack significantly more efficient than exhaustive key search No export restrictions on terminals (or SIMs); network equipment exportable under licence in accordance with Wassenaar Time for development - six months! Eurocrypt 2000 Security of 3GPP networks 27

General Approach to Design Robust approach to exportability - full strength algorithm and expect agencies to fall into line ETSI SAGE appointed as design authority Take existing algorithm as starting point Use block cipher as building block for both algorithms - MISTY1 chosen: fairly well studied, some provable security aspects parameter sizes suitable designed to be efficient in hardware and software offered by Mitsubishi free from royalty payments Eurocrypt 2000 Security of 3GPP networks 28

Design and Analysis Designed by SAGE team, led by Gert Roelofsen with external experts: SAGE design and evaluation teams joined by Mitsuru Matsui from Mitsubishi - designer of MISTY additional evaluators from Nokia, Ericsson and Motorola led by Kaisa Nyberg External evaluation by three teams: Leuven: Lars Knudsen, Bart Preneel, Vincent Rijmen, Johan Borst, Matt Robshaw Ecole Normale Superiere: Jacques Stern, Serge Vaudenay Royal Holloway: Fred Piper, Sean Murphy, Peter Wild, Simon Blackburn Open Publication - back on ETSI web site again in June? Eurocrypt 2000 Security of 3GPP networks 29

Kasumi Simpler key schedule than MISTY Additional functions to complicate cryptanalysis without affecting provable security aspects Changes to improve statistical properties Minor changes to speed up or simplify hardware Stream ciphering f8 uses Kasumi in a form of output feedback, but with: BLKCNT added to prevent cycling initial extra encryption added to protect against chosen plaintext attack and collisions Integrity f9 uses Kasumi to form CBC MAC with: non-standard addition of 2nd feedforward Eurocrypt 2000 Security of 3GPP networks 30

3GPP Stream Cipher f8 Eurocrypt 2000 Security of 3GPP networks 31

3GPP Integrity Function f9 Eurocrypt 2000 Security of 3GPP networks 32

Other Aspects of 3GPP Security Options in AKA for sequence management Re-authentication during a connection and periodic in-call Failure procedures Interoperation with GSM AKA+ and interoperation with 3GPP2 standards Formal analysis of AKA User identity confidentiality and enhanced user identity confidentiality (R00) User configurability and visibility of security features User-USIM, USIM-terminal & USIM - network (SAT) Terminal (identity) security Lawful interception Fraud information gathering Network wide encryption (R00) Location services security Access to user profiles Mobile IP security (R00+) Provision of a standard authentication and key generation algorithm for operators who do not wish to produce their own Eurocrypt 2000 Security of 3GPP networks 33

References to 3GPP Security Principles, objectives and requirements TS 33.120 Security principles and objectives TS 21.133 Security threats and requirements Architecture, mechanisms and algorithms TS 33.102 Security architecture TS 33.103 Integration guidelines TS 33.105 Cryptographic algorithm requirements TS 22.022 Personalisation of mobile equipment Lawful interception TS 33.106 Lawful interception requirements TS 33.107 Lawful interception architecture and functions Technical reports TR 33.900 A guide to 3G security TR 33.901 Criteria for cryptographic algorithm design process TR 33.902 Formal analysis of the 3G authentication protocol TR 33.908 General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms Algorithm specifications Specification of the 3GPP confidentiality and integrity algorithms Document 1: f8 & f9 Document 2: KASUMI Document 3: implementors test data Document 4: design conformance test data Eurocrypt 2000 Security of 3GPP networks 34