3G Security Principles: - Build On GSM Security - Correct Problems With GSM Security - Add New Security Features
3G Security Principles: - Build On GSM Security - Correct Problems With GSM Security - Add New Security Features
3G Security Principles: - Build On GSM Security - Correct Problems With GSM Security - Add New Security Features
Source: 3GPP
MS
Um
MSC
BTS
BSC
A-bis
OMC
Voice Traffic
Circuit-switched technology
Mobility
mgt
VLR
HLR
AUC
EIR
Authentication
Protect from unauthorized service access
Based on the authentication algorithm A3(Ki, RAND)=> SRES
Problems with inadequate algorithms
Encryption
Scramble bit streams to protect signaling and user data
Ciphering algorithm A8(Ki, RAND) => Kc
A5(Kc, Data) => Encrypted Data
Need stronger encryption
Confidentiality
Prevent intruder from identifying users by IMSI
Temporary MSI
Need more secure mechanism
Transparency
Security features operate without user assistance
Needs greater user visibility
Minimized Trust
Requires minimum trust between HE and SN
Key Transmission
and
Channel Hijack
Protection against radio channel hijack relies on encryption.
However, encryption is not used in some networks.
Unilateral Authentication
Only user authentication to the network is provided.
No means to identify the network to the user.
Unsecured Terminal
IMEI is an unsecured identity
Integrity mechanisms for IMEI are introduced late
Lack of Visibility
No indication to the user that encryption is on
No explicit confirmation to the HE that authentication parameters are
properly used in SN when subscribers roam
Inflexibility
Inadequate flexibility to upgrade and improve security functionality
over time
3G Network Architecture
Circuit
Network
Circuit
Switch
Circuit/
Signaling
Gateway
IN Services
Feature
Server(s)
RNC
Voice
Radio Access
Control
Data +
Packet
Voice
Mobility
Manager
Call
Agent
IP Core
Network
Packet
Gateway
Packet Network
(Internet)
IP RAN
2G
2G/2.5G
3G
Explicit Integrity
Data integrity is assured explicitly by use of integrity algorithms
Also stronger confidentiality algorithms with longer keys
Network Security
Mechanisms to support security within and between networks
IMEI Integrity
Integrity mechanisms for IMEI provided from the start
Secure Applications
Provide security for applications resident on USIM
Fraud Detection
Mechanisms to combating fraud in roaming situations
Flexibility
Security features can be extended and enhanced as required by new
threats and services
10
Lawful Interception
Mechanisms to provide authorized agencies with certain information
about subscribers
11
Summary of 3G Security
Features, 1
User Confidentiality
Permanent user identity IMSI, user location, and user services cannot be
determined by eavesdropping
Achieved by use of temporary identity (TMSI) which is assigned by
VLR
IMSI is sent in cleartext when establishing TMSI
USIM
VLR
IMSI request
IMSI
TMSI allocation
TMSI acknowledgement
12
Summary of 3G Security
Features, 2
Mutual Authentication
During Authentication and Key Agreement (AKA) the user and network
authenticate each other, and also they agree on cipher and integrity key
(CK, IK). CK and IK are used until their time expires.
Assumption: trusted HE and SN, and trusted links between them.
After AKA, security mode must be negotiated to agree on encryption
and integrity algorithm.
AKA process:
USIM
VLR
HLR
AV request, send IMSI
RAND(i) || AUTN(i)
Generate RES(i)
Generate authentication
data V(1..n)
Compare RES(i) and XRES(i)
13
Summary of 3G Security
Features, 3
Generation of authentication data at HLR:
Generate SQN
Generate RAND
SQN
RAND
AMF
K
f1
MAC
f2
f3
f4
f5
XRES
CK
IK
AK
14
Summary of 3G Security
Features, 4
Generation of authentication data in USIM:
RAND
AUTN
f5
SQN AK
AK
AMF
MAC
SQN
K
f1
f2
f3
f4
XMAC
RES
CK
IK
15
Summary of 3G Security
Features, 5
Data Integrity
Integrity of data and authentication of origin of signalling data must be
provided
The user and network agree on integrity key and algorithm during AKA
and security mode set-up
COUNT-I
DIRECTION
MESSAGE
IK
f9
COUNT-I
FRESH
DIRECTION
MESSAGE
IK
FRESH
f9
MAC -I
XMAC -I
Sender
UE or RNC
Receiver
RNC or UE
16
Summary of 3G Security
Features, 6
Data Confidentiality
Signalling and user data should be protected from eavesdropping
The user and network agree on cipher key and algorithm during AKA
and security mode set-up
COUNT-C
DIRECTION
BEARER
CK
COUNT-C
LENGTH
f8
BEARER
CK
KEYSTREAM
BLOCK
PLAINTEXT
BLOCK
DIRECTION
f8
KEYSTREAM
BLOCK
CIPHERTEXT
BLOCK
Sender
UE or RNC
LENGTH
PLAINTEXT
BLOCK
Receiver
RNC or UE
17
Summary of 3G Security
Features, 7
IMEI
IMEI is sent to the network only after the authentication of SN
The transmission of IMEI is not protected
User-USIM Authentication
Access to USIM is restricted to authorized users
User and USIM share a secret key, PIN
USIM-Terminal Authentication
User equipment must authenticate USIM
Secure Applications
Applications resident on USIM should receive secure messages over the
network
Visibility
Indication that encryption is on
Indication what level of security (2G, 3G) is available
18
Summary of 3G Security
Features, 8
Configurability
User configures which security features activated with particular services
Enabling/disabling user-USIM authentication
Accepting/rejecting incoming non-ciphered calls
Setting up/not setting up non-ciphered calls
Accepting/rejecting use of certain ciphering algorithms
GSM Compatibility
GSM user parameters are derived from UMTS parameters using the
following conversion functions:
cipher key Kc = c3(CK, IK)
random challenge RAND = c1(RAND)
signed response SRES = c2(RES)
GSM subscribers roaming in 3GPP network are supported by
GSM security
context (example, vulnerable to false BTS)
19
A user can be enticed to camp on a false BS. Once the user camps on the radio
channels of a false BS, the user is out of reach of the paging signals of SN
20
References
21