By Theodora Kontogianni

Slides:



Advertisements
Similar presentations
Lecture 5: Cryptographic Hashes
Advertisements

Lecture 7 Overview. Advanced Encryption Standard 10, 12, 14 rounds for 128, 192, 256 bit keys – Regular Rounds (9, 11, 13) – Final Round is different.
Siyang Tian. TOPIC 1.SIM CARD card embedded with subscriber identity module 2. 3G network 3rd generation mobile telecommunications.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Differential Power Analysis of Smartcards How secure is your private information? Author: Ryan Junee Supervisor: Matt Barrie.
GSM Global System for Mobile Communications
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Information Security for Managers (Master MIS)
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
Security in GSM/GPRS and UMTS
GSM CLONING. GSM (Global System for Mobile Communication) Most widely used cellular mobile phone system. First digital system to follow analog era. Specification.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Phosphor A Cloud based DRM Scheme with Sim Card th International Asia-Pacific Web Conference Author : Peng Zou, Chaokun Wang, Zhang Liu, Dalei.
Cellular Mobile Communication Systems Lecture 8
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
Chapter 4 Application Level Security in Cellular Networks.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Overview of cellular system
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
CS480 Cryptography and Information Security
Overview of the GSM for Cellular System
Wireless Network PMIT- By-
Chapter3: Block Ciphers and the Data Encryption Standard
GPS.
GSM.
GSM SECURITY AND ENCRYPTION
Cryptographic Hash Function
Data Encryption Standard
3G Security Principles Build on GSM security
Encryption
Fundamentals of Cellular and Wireless Networks
Presented by: Dr. Munam Ali Shah
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
GSM location updating procedure
Subject Name: GSM Subject Code: 10EC843
Security in Network Communications
GSM location updating procedure
Chapter -2 Block Ciphers and the Data Encryption Standard
Mobile Phone Technology
GSM Global System for Mobile Communications, 1992
Computer Security IT423 Semester II
International Data Encryption Algorithm
Hashing Hash are the auxiliary values that are used in cryptography.
Counter With Cipher Block Chaining-MAC
Advanced Encryption Standard
Special Topic: Wireless Security
Feistel Cipher Structure
LM 7. Cellular Network Security
Security in Wide Area Networks
Presentation transcript:

By Theodora Kontogianni 18.09.2018 Seminar Mobile Security SIM CARDS By Theodora Kontogianni 18.09.2018 Assigned tutor: Daniel Loebenberger

SECURITY OF SIM CARDS = SECURITY OF CRYPTOGRAPHIC ALGORITHMS GOAL SECURITY OF SIM CARDS = SECURITY OF CRYPTOGRAPHIC ALGORITHMS

OVERVIEW Definition and structure of SIM cards. A3 A8 COMP128 implementation A5 Attacks

Definition and key points Subscriber Identity Module Cards(SIM Cards) A special case of smart cards with a microprocessor Two major types Full size SIM Embedded SIM card (for mobile phones) Embedded SIM card

Comments on different types of SIM cards Same thickness on all the types Same pins Difference in length and width according to the devices´ needs

Components of SIM Card CPU ROM EPROM or E2PROM RAM Serial communication module

Important information stored in SIM cards. Besides SMS and Contacts Passwords PIN and PUK International mobile subscriber identity (IMSI) Integrated circuit card identifier (ICC-ID) Security authentication (Ki) Ciphering information (Kc) And many others!

Main levels of defence Prevention of unauthorized access and usage PIN (4~8 digits) PUK (0~9 digits) Local security measure –network not involved Customer Identity Authentication Algorithm A3 (Authentication) Algorithm A8 (Cipher Key Generation) Both algorithms stored in SIM card Ciphering of air sent information Algorithm A5 (Encryption) Embedded in hardware New ciphering key (Kc) for each call Kc and Ki never transmitted over network Anonymity TMSI sent instead of IMSI

GSM Architecture a Home Location Register Authentication Center

A3-GSM Authentication An 128-bit random challenge(RAND) is generated by HLR and sent to ME. SIM card encrypts RAND using A3 and Ki stored in SIM card. A 32-bit response is generated(SRES) SRES is sent back to the network. Same operations take place in HLR. If both SRES are equal then authentication is successful.

A3 Graphical Overview ? A3 HLR 128-bit challenge RAND Mobile Equipment (ME) Ki 32-bit response SRES ? Radio Link If challenges equal then authenticated A3 Ki SIM IMPORTANT : Ki is never transmitted over the radio link.

A8-Cipher Key Generation The same 128-bit random challenge (RAND) used in A3 is the input to A8 also. SIM card encrypts RAND using A8 and Ki stored in SIM card. A 64-bit cipher key is generated (Kc). Kc is used in A5 algorithm.

COMP128 implementation A3/A8 are both implemented together in COMP128 since they have the same input. It was developed in secret so it lacked peer review and testing. In 1998 a document with its implementation leaked with only a few lines missing that where reverse engineered. COMP128 128-bit RAND 128-bit Ki 32-bit SRES 64-bit Kc

COMP128 implementation details 8 rounds – 5 layers Based on a hash function Input = 256 bits = 32 bytes= 16 bytes + 16 bytes Output = 128 – 32leftmost – 64 rightmost = 32 bits Ki= X[0..15] RAND= X[16..31] Kc MAC Adress

COMP128- Implementation Details Order of events RAND and Ki concatenated in input X[0..31]. The input is hashed 8 times which reduces it from 32 to 16 bytes. After each hashing but the last the X is permuted. The output of permutation is the input of the next round. After 8 rounds the last hash value is the output.

COMP128

COMPRESSION-Hash function Butterfly Structure 16 combining operations of input pair to output pair for each layer. 5 look-up tables Ti (S-box), one for each of the 5 levels i Each Ti contains 2 9-i (8-i)-bit values So T0 has 512 8-bit values, T1 has 256 7-bit values and so on....

Butterfly Structure

Hash function example Example: On level 0 X[ ] is split in X[0..15] and X[16..31] The value of each one element of the right part (X[i+16]) is combined with each element of the left (X[i]) to compute y= (X[i]+2*X[i+16])mod 512 and z=(X[i+16]+2*X[i])mod 512 Finally the X[i] = T0[y] and X[i+16] = T0[z] So the size of elements is reduced from table to table.

Substitution of Elements

A5-Encryption Built-in inside the hardware 3 major versions A5/1: the stronger A5/2: the weaker A5/3: for 3GPP-Kasumi systems Also secret Design leaked in 1994 Reverse engineered by Briceno

A5/1 Logical Details Conversation in GSM system is a sequence of frames Each frame is 114 bits from A(ME) to B(Base Station) and 114 bits from B to A. A5 Kc (64 bit) Fn (22 bit) 114 bit XOR Data (114 bit) Ciphertext (114 bit) Mobile Equipment BTS

System Overview

Attacs on COMP128 First in 1998 (Smart Card Developer Association) Exploits weakness in the Butterfly Structure called narrow pipe. After the second layer of the first round, the output bytes X[i], X[i+8], X[i+16], X[i+24] depend ONLY on the input bytes with the same indices. X[i]=Ki[i] and X[i+18]=Ki[i+18] i=0..7 Size of narrow pipe is 4 bytes.

Narrow pipe

Collision We vary X[i+16], X[i+24] The rest constant With chosen text attacks we can hope for a collision. When collision occurs in round two, it propagates until the last round. According to the birthday paradox, 214 random challenges are needed to find 2 bytes of Ki[i] and Ki[i+8]. 217 chosen texts for the whole Ki

Other attacks on COMP128 More attacks based on side channels Partitioning Attack by IBM Look up table emit data, especially on the first round 8 chosen plaintext

Conclusion COMP128 attacks needs 217 queries and possession of the SIM card SIM cards stop functioning after so many queries Partitioning attack more than 1000 random challenges More and more attacks Companies are afraid of the cost of changing. Reluctant to put their algorithms under peer review.

Thank you! Images on slides 16,18, 20 are modified by COMP128 : A Birthday surprise