Crypto U12 (part 1), crypto for mobile telecom

Description

IYM002 (Unit 12 - Crypto Systems) Mind Map on Crypto U12 (part 1), crypto for mobile telecom, created by jjanesko on 28/04/2013.
jjanesko
Mind Map by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko almost 11 years ago
101
10

Resource summary

Crypto U12 (part 1), crypto for mobile telecom
  1. background
    1. mobile telecom companies share operational standards
      1. original mobile systems not secure
        1. sent serial numbers in the clear
          1. eavesdropping easy
            1. cloning possible
            2. GSM
              1. designed by ETSI
                1. European Telecommunications Standards Institute
                2. improved security over original
                3. UTMS
                  1. next step in evolution after GSM
                  2. cellular network diagram

                    Annotations:

                    • http://en.wikipedia.org/wiki/Zero-knowledge_proof#Abstract_example
                  3. general design
                    1. main motivation for security: revenue protection
                      1. must be cost effective
                        1. should be as secure as the public switched telephone network and not more
                          1. adapts to evolving constraints
                            1. shifted from proprietary algorithms (GSM) to publicly known ones (UTM)
                              1. must handle noisy comm channel
                              2. UTMS
                                1. new features
                                  1. mutual entity authentication
                                    1. supported by AKE (similar to GSM except additonal MAC key is generated)
                                      1. sequence # added for freshness and maintained by mobile device and base station
                                      2. prevention of AKE triplet replay
                                        1. sequence #'s prevent replay
                                          1. roaming authentication upgraded to have quintlets
                                          2. longer key lengths
                                            1. publicly know algorithms
                                              1. integrity of signalling data with a MAC
                                            2. GSM
                                              1. security requirements
                                                1. entity authentication of the user
                                                  1. confidentiality on radio path
                                                    1. anonymity on radio path
                                                      1. prevents an attacker form linking the source of several calls
                                                      2. constraints
                                                        1. not excessively strong
                                                          1. export!
                                                          2. do not add to much overhead
                                                            1. especially on call setup
                                                        2. design
                                                          1. fully symmetric architecture
                                                            1. GSM closed system
                                                              1. fast
                                                              2. stream cipher
                                                                1. noisy comm channel
                                                                2. fixed encryption algorithms
                                                                  1. proprietary algorithms
                                                                    1. closed system
                                                                      1. ETSI has crypto expertise
                                                                        1. performance
                                                                      2. crypto components
                                                                        1. subscriber identification module (SIM)
                                                                          1. has international mobile subscriber identity
                                                                            1. maps user to phone
                                                                            2. has unique 128 bit crypto key used for all crypto services
                                                                            3. AKE (authentication and key establishment)
                                                                              1. uses dynamic password scheme
                                                                                1. protocols
                                                                                  1. A3
                                                                                    1. challenge response protocol
                                                                                    2. A8
                                                                                      1. generate encryption key
                                                                                    3. not shared with other access providers
                                                                                      1. special roaming scheme
                                                                                      2. comm encryption
                                                                                        1. service shared with other mobile networks
                                                                                          1. Uses standard A5/1
                                                                                            1. 64 bit key, stream cipher
                                                                                        2. security analysis
                                                                                          1. popular implementation of A3 and A8 was COMP 128
                                                                                            1. designs leadked and weaknesses found
                                                                                            2. A5/1 reverse engineered
                                                                                              1. powerful attacks developed
                                                                                              2. effective because it addressed cloning and eavesdropping
                                                                                            Show full summary Hide full summary

                                                                                            Similar

                                                                                            Crypto U12 (part 2), crypto for mobile telecom
                                                                                            jjanesko
                                                                                            Crypto U12, WLAN
                                                                                            jjanesko
                                                                                            Crypto U12, SSL
                                                                                            jjanesko
                                                                                            Crypto U12 GSM,UTMS Hierarchy Diagram
                                                                                            jjanesko
                                                                                            Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                                            jjanesko
                                                                                            Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                                            jjanesko
                                                                                            Crypto U3, Theoretical vs. Practical Security
                                                                                            jjanesko
                                                                                            Crypto U1, Basic Principles
                                                                                            jjanesko
                                                                                            Crypto U4, Stream Cipher
                                                                                            jjanesko
                                                                                            Crypto U4, Block Cipher, Counter Mode
                                                                                            jjanesko
                                                                                            Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                                            jjanesko