Ciphering in GSM Mobile Stations Base Station Subsystem Exchange System Network Management Subscriber and terminal equipment databases BSC MSC VLR HLR.

Slides:



Advertisements
Similar presentations
Cellular Wireless Networks
Advertisements

GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
GSM Security Overview (Part 3)
Topics In Information Security Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication Presented by Idan Sheetrit
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Mario Čagalj University of Split 2013/2014. Security of Cellular Networks: Man-in-the Middle Attacks ‘Security in the GSM system’ by Jeremy Quirke, 2004.
Modern Symmetric-Key Ciphers
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
GSM Adapted from Acoe 422. History of GSM  During the 80s, analog cellular systems experienced rapid growth in Europe, yet they were incompatible.
GSM System Architecture
Modes Mobile Station ( MS )
Cellular Mobile Communication Systems Lecture 7
TEL 355: Communication and Information Systems in Organizations
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
CDMA Power Control, Smart Antenna. Power Control in CDMA All the mobiles communicate on the same frequency. Therefore, internal interference is developed.
GSM Network Structure Lance Westberg.
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
GSM Mobile Computing IT644.
4.1 Architecture of the GSM system GSM is a PLMN (Public Land Mobile Network) – several providers setup mobile networks following the GSM standard within.
GSM Network Architecture
Overview of cellular system
Communication Protocol Engineering Lab.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
University of Malawi, Chancellor College
(Global System for Mobile Communication)
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Bitwali1 Wireless Communication Introduction to Mobile Communication and Cellular System Lecture 3-4.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-7 Secret-Key Ciphers.
9 Transmission and Switching Mohamed Ashour, German University in Cairo Mohamed Ashour Lecture Fall 2011 AC = authentication center BSS = base station.
Overview of the GSM for Cellular System
Communication Security Lecture 4: Introduction To GSM
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM Training for Professionals
Global System for Mobile Communications
GSM SECURITY AND ENCRYPTION
GSM,GPRS & CDMA Technology
GSM.
GPS-IN MOBILE NETWORKS
Wireless Communications MOBILE COMMUNICATIONS Lecture:7
Fundamentals of Cellular and Wireless Networks
By Theodora Kontogianni
Subject Name: GSM Subject Code: 10EC843
Global system for Mobile Communications
חלק ב' – תקשורת תאית פרק 1. מבוא
Chap14. GSM Operations, Administration, and Maintenance
Prof. Saravanan Vijayakumaran
Sequential Design Example
Mario Čagalj University of Split 2013/2014. Security of Cellular Networks: Man-in-the Middle Attacks ‘Security in the GSM system’ by Jeremy Quirke, 2004.
GSM Call Setup.
Cryptology Design Fundamentals
Dept. of Business Administration
JAIN FOR MAP PROJECT GROUP: Maurizio Bonuccelli Piero Lauri
Information and Computer Security CPIS 312 Lab 4 & 5
Counter With Cipher Block Chaining-MAC
Presentation transcript:

Ciphering in GSM Mobile Stations Base Station Subsystem Exchange System Network Management Subscriber and terminal equipment databases BSC MSC VLR HLR EIR AUC OMC BTS A5 Encryption 1

Ciphering in GSM A5 CIPHERING SEQUENCE PLAINTEXT SEQUENCE KcKc FRAME NUMBER Sender (Mobile Station or Network) Receiver (Network or Mobile Station) CIPHERTEXT SEQUENCE A5 CIPHERING SEQUENCE KcKc FRAME NUMBER PLAINTEXT SEQUENCE 2

A5/1 Overview A5/1 is a stream cipher, which is initialized all over again for every frame sent. Consists of 3 LFSRs of 19, 22, 23 bits length. The 3 registers are clocked in a stop/go fashion using the majority rule. “Cryptography is a mixture of mathematics and muddle, and without the muddle the mathematics can be used against you.” - Ian Cassells, a former Bletchly Park cryptanalyst. 3 Register Number Length In bits Primitive Polynomial Clock-Controlling Bit (LSB is 0) Bits that Are XORed 119 x 19 + x 18 + x 17 + x 16 + x ,17,16, x 22 + x 21 + x , x 23 + x 22 + x 21 + x 20 + x ,21,20,7 Parameters of the A5/1 Registers

clock control C3 C2 C1 R2 R1 R

A5/1 : Operation All 3 registers are zeroed 64 cycles (without the stop/go clock) : ◦ Each bit of K C (lsb to msb) is XOR'ed in parallel into the lsb's of the registers 22 cycles (without the stop/go clock) : ◦ Each bit of F n (lsb to msb) is XOR'ed in parallel into the lsb's of the registers 100 cycles with the stop/go clock control, discarding the output 228 cycles with the stop/go clock control which produce the output bit sequence. 5