Karsten Nohl, karsten@srlabs.de. Breaking GSM phone privacy



Similar documents
Karsten Nohl, Chris Paget 26C3, Berlin GSM SRSLY?

Evaluating GSM A5/1 security on hopping channels

Defending mobile phones. Karsten Nohl, Luca Melette,

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

1. a. Define the properties of a one-way hash function. (6 marks)

GSM Risks and Countermeasures

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Mobile network security report: Poland

Three attacks in SSL protocol and their solutions

The Misuse of RC4 in Microsoft Word and Excel

Mobile network security report: Belgium

GSM security country report: USA

GSM security country report: Germany

Mobile network security report: Greece

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Authentication in WLAN

Lab 7. Answer. Figure 1

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

SecureCom Mobile s mission is to help people keep their private communication private.

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Mobile network security report: Netherlands

Mobile network security report: Germany

Mobile network security report: Poland

Wireless Networks. Welcome to Wireless

TLS and SRTP for Skype Connect. Technical Datasheet

Chapter 6 CDMA/802.11i

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Mobile network security report: Norway

Security Protocols/Standards

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Fast Implementations of AES on Various Platforms

GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING

Chapter 17. Transport-Level Security

Table of Contents. Bibliografische Informationen digitalisiert durch

Message Authentication Codes

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Authentication requirement Authentication function MAC Hash function Security of

Network Security: Cryptography CS/SS G513 S.K. Sahay

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)

CSCE 465 Computer & Network Security

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

SPINS: Security Protocols for Sensor Networks

Message authentication and. digital signatures

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Privacy and Security in library RFID Issues, Practices and Architecture

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Security in IEEE WLANs

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Authentication and Security in Mobile Phones

Fast Software AES Encryption

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

SIM card exploita9on. The SRLabs Team. SRLabs Template v12

Chapter 10. Network Security

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Speeding up GPU-based password cracking

Network Security Part II: Standards

SSL/TLS: The Ugly Truth

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL

Security of phone communications

Installation and usage of SSL certificates: Your guide to getting it right

Using TEMS Pocket. Johan Montelius

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

How To Understand And Understand The History Of Cryptography

SPYTEC 3000 The system for GSM communication monitoring

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Practical Attacks on DOCSIS

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Network Security. Modes of Operation. Steven M. Bellovin February 3,

Wireless LAN Security Mechanisms

Message Authentication

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

Protocol Rollback and Network Security

Content Teaching Academy at James Madison University

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Chapter 23. Database Security. Security Issues. Database Security

Communication Systems SSL

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

Secure Socket Layer. Security Threat Classifications

How To Encrypt With A 64 Bit Block Cipher

Cipher Techniques on Networks. Amit Konar Math and CS, UMSL

The Secure Sockets Layer (SSL)

Message authentication

SSL A discussion of the Secure Socket Layer

Client Server Registration Protocol

Transcription:

arsten Nohl, karsten@srlabs.de Breaking GSM phone privacy

GSM is global, omnipresent and wants to be hacked 80% of mobile phone market 200+ countries 5 billion users! GSM encryption introduced in 1987 then disclosed and shown insecure in 1994 Source:Wikipedia, Bitkom press statement July 28 th 2010 Breaking GSM privacy 1

Industry responds to GSM cracker by creating a new challenge the GSM call has to be identified and recorded from the radio interface. [ ] we strongly suspect the team developing the intercept approach has underestimated its practical complexity. A hacker would need a radio receiver system and the signal processing software necessary to process the raw radio data. GSMA, Aug. 09 This talk introduces signal processing software to decode GSM calls Source: GSMA press statement Breaking GSM privacy 2

GSM uses symmetric session keys for call privacy Operator and Random nonce phone share a master key to de- Master key rive session keys Hash function Session key Random nonce and session key Random nonce Communication A5/1- Operator Home Location Register Base station encrypted with session key Cell phone This talk discusses a technique for extracting session keys Breaking GSM privacy 3

A5/1 is vulnerable to generic precomputation attacks Code book attacks Code books break encryption functions with small keys Secret state A52F8C02 62B9320A C309ED0A Output 52E91001 52E91002 52E91003 Code book provides a mapping from known output to secret state An A5/1 code book is 128 Petabyte and takes 100,000+ years to be computed on a PC This talk revisits techniques for computing an A5/1 code book fast and storing it efficiently Breaking GSM privacy 4

ey requirement of code book generation is a fast A5/1 engine Time on single threaded CPU: 100,000+ years 1 2 3 Parallelization Bitslicing increases already large number of parallel computations by a factor of 256 Algorithmic tweaks Compute 4 bits at once Cryptographic tweaks Executing A5/1 for 100 extra clock cycles decreases key space by 85% Result: 1 month on 4 ATI GPUs *NVidia CUDA and ATI Brook GPUs are supported Breaking GSM privacy 5

1 GPUs allow for massive parallelization of code book computation Bitslicing: 1 PC with 3 graphics cards à 2 GPUs à 60 cores computes almost 100,000 A5/1 operations in parallel Source:iX 5/2010: Geheimnislos Breaking GSM privacy 6

3 A5/1 key space shrinks to 2 61 secret states Ring with 2 64 states LFSR used in older stream ciphers preserve the full output space of a function However, they have statistical weaknesses These states can be ignored for A5/1 attacks Relevant states: Rings with 2 61 states Newer stream ciphers therefore use NLFRs The output space of NLFSR slowly collapses The 100 extra A5/1 clocks in GSM shrink the output space by 85% (resulting in 30 faster cracking!) Breaking GSM privacy 7

Pre-computation tables store the code book condensed E233 2F06 503A OCFE DB18 22CB B951 CAF3 A8F3 CAF3 77CF 77CF Collision 87A4 49A6 118F B33F Longer chains := a) less storage, b) longer attack time Source:c t Breaking GSM privacy 8

Distinguished point tables save hard disk lookups 7707 BEFO 6100 B0F0 44B2 F415 44B2 A200 A200 Collision CA06 302F B400 Hard disk access only needed at distinguished points Source:c t Breaking GSM privacy 9

Rainbow tables mitigate collisions E233 1 44B2 2 BBA8 3 1B22 Collision DB18 1 ODE3 2 44B2 3 5DE2 22CB 1 6C7A 2 55D2 3 922A 1 2 3 87A4 11F6 362E C7D5 Rainbow tables have no mergers, but an exponentially higher attack time Source:c t Breaking GSM privacy 10

The combination of both table optimizations provides best trade-off Start 1 2-5 6 7 End Distinguished points: Last 15 bits are zero Breaking GSM privacy 11

Open source components fit together in analyzing GSM calls GnuRadio records data from air Airprobe parses control data raken cracks A5/1 key Airprobe decodes voice Requires Software radio, ie. USRP Recommended for upstream: BURX board Requires 2TB of rainbow tables ATI graphics card and SSD/RAID for fast cracking Breaking GSM privacy 12

Downstream can be recorded for large areas Downstream recording range: 5 35km Upstream recording range: 100-300m Breaking GSM privacy 13

GSM discloses more known keystream than assumed in previous crack attempts Assignment Frame with known or guessable plaintext Very early Early Late nown Channel Timing known through Unknown Channel Mobile terminated calls Network terminated calls 1. Empty Ack after Assignment complete 2. Empty Ack after Alerting 3. Connect Acknowledge 4. Idle filling on SDCCH (multiple frames) 5. System Information 5+6 (~1/sec) 6. LAPDm traffic 1. Empty Ack after Cipher mode complete 2. Call proceeding 3. Alerting 4. Idle filling (multiple frames) 5. Connect 6. System Information 5+6 (~1/sec) 7. LAPDm Stealing bits Counting Counting frames Stealing bits Counting Source:GSM standards Breaking GSM privacy 14

Randomized padding would mitigate attack potential SDCCH trace 238530 03 20 0d 06 35 11 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238581 03 42 45 13 05 1e 02 ea 81 5c 08 11 80 94 03 98 93 92 69 81 2b 2b 2b 238613 00 00 03 03 49 06 1d 9f 6d 18 10 80 00 00 00 00 00 00 00 00 00 00 00 238632 01 61 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238683 01 81 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238715 00 00 03 03 49 06 06 70 00 00 00 00 00 04 15 50 10 00 00 00 00 0a a8 238734 03 84 21 06 2e 0d 02 d5 00 63 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238785 03 03 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b Padding in GSM has traditionally been predictable (2B) Every byte of randomized padding increasing attack cost by two orders of magnitude! Randomization was specified in 2008 (TS44.006) and should be implemented with high priority Additionally needed: randomization of system information msg. Breaking GSM privacy 15

Open research into GSM security grows exponentially??? OsmoconBB: phone firmware HLR tracking of phone users GSM Security Project: A5/1 decrypt tool OpenBTS: Full base station emulation OpenBSC: Controller for base stations CryptoPhone et al.: End-to-end encryption on phones 2006 07 08 09 10 11 12 Breaking GSM privacy 16

Questions? Research supported by Tables, Airprobe, raken Project Wiki arsten Nohl srlabs.de reflextor.com/trac/a51 karsten@srlabs.de Many thanks to Sascha rißler, Frank A. Stevenson, MvdS, Dieter Spaar, Harald Welte, Philipp Maier and David Burgess! Breaking GSM privacy 17