Authentication and Ciphering in 3G and Simulation: Presentation On
Authentication and Ciphering in 3G and Simulation: Presentation On
Authentication and Ciphering in 3G and Simulation: Presentation On
Submitted by
Shailendra kumar
bagri
Objective
Introduction of 3G
3G Architecture
USIM Cards and its Features
Authentication and Ciphering Parameters in
3G
Difference Between 2G(GSM) and 3G(UMTS)
Parameters
Utility of Ciphering and Authentication
Procedures
Authentication Procedure in 3G Network
Ciphering Procedure in 3G Network
Implementation of Ciphering in 3G
Summary
References
OBJECTIVE OF THIS PROJECT
Implementation of Authentication
Algorithm and Ciphering
Procedure in 3G Mobile
Communication Technology.
The Universal Mobile Telecommunication system
(UMTS) is a realization of third generation (3G)
networks, which intend to establish a single integrated
and secure network.
Development of
UMTS(3G)
• Research on the suitability of CDMA and TDMA for
3G started in 1991.
• 3GPP was created in Denmark in 1998, it specifies
UMTS standards.
CELLULAR GENERATION
Some requirements for 3G were shortlisted as follow:
– Requirements:
The UTRAN provides the air interface access method for User
Equipment. Base Station is referred as Node-B and control
equipment for Node-B's is called Radio Network Controller
(RNC).
The functions of Node-B
are:
Air interface Transmission / Reception
Modulation / Demodulation
Error Handing
Admission Control
Channel Allocation
Handover Control
Ciphering
Broadcast Signalling
BLOCKS USED IN UMTS
ARCHITURE
BTS Base Transceiver Station
BSC Base Station Controller
BSS Base Sub Station
RNC Radio Network Controller
RNS Radio Network Subsystem
MSC Mobile Switching Center
VLR Visitor Location Register
HLR Home Location Register
EIR Equipment Identity Register
AUC Authentication Center
SGSN Serving GPRS Support Node
GGSN Gateway GPRS Support Node
GMSC Gateway Mobile Switching
USIM CARDS AND ITS
FEATURES
The subscription - specific information set is called a USIM.
The USIM is also called “SIM” because the services actually
follow SIM card identification information in every respect. The
corresponding information is originally stored in the HLR of the
home network of the subscriber.
Users of the packet data domain (PS) can also use an
additional ISIM application in the UICC for the IMS services.
The clear difference between a GSM SIM and USIM is that a
USIM is, by default, downloadable and its information is
accessible and updatable through the radio path. A
functionality making USIM information accessible to TE
applications is the USIM Application Toolkit (USAT).
SUBSCRIBER IDENTITY MODULE IN GSM
A USIM basically contains five types of data:
Administrative Data :
These are data assigned by the USIM manufacturer
and service provider/operator that cannot be altered,
such as key values for security algorithms, IMSI and
access class information.
Personal data:
These cover the data the user stores in the SIM
(e.g., SMSs and abbreviated dialling).
USIM is downloadable.
AUTHENTICATION AND
CIPHERING
Authentication - Whenever a MS requests access to
a network, the network must authenticate the MS.
Authentication verifies the identity and validity of the
SIM card to the network and ensures that the
subscriber is authorized access to the network.
Mutual authentication
5)
6
If the sequence number SQN is not acceptable, the
USIM computes the re-synchronisation token AUTS
and triggers the ME to send back a user authentication
response back to the VLR or SGSN, with an indication
of synchronisation failure, including the re-
synchronisation token AUTS, and abandons the
procedure. The remaining paragraphs therefore apply
for the case where SQN is acceptable
6) The USIM then computes the response RES =
f2K(RAND) and triggers the ME to send back a user
authentication response back to the VLR or SGSN,
with an indication of successful receipt of the signed
challenge and including the response RES.