Siyang Tian. TOPIC 1.SIM CARD card embedded with subscriber identity module 2. 3G network 3rd generation mobile telecommunications.

Slides:



Advertisements
Similar presentations
Christopher Avilla. What is MiTM?Computer MiTMGSM MiTM Tips for Detection of MiTM.
Advertisements

An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
Kingdom Special Operations SJS-KW
GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
Topics In Information Security Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication Presented by Idan Sheetrit
CELLULAR TELEPHONE NETWORK SECURITY Ari Vesanen, Department of Information Processing Sciences, University of Oulu.
LINEAR FEEDBACK SHIFT REGISTERS, GALOIS FIELDS, AND STREAM CIPHERS Mike Thomsen Cryptography II May 14 th, 2012.
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
GSM standard (continued)
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
Chapter 5 Cryptography Protecting principals communication in systems.
FEAL FEAL 1.
Encryption Transaction with 3DES Team W2 Yervant Dermenjian (W21) Taewan Kim (W22) Evan Mengstab(W23) Xiaochun Zhu(W24) Objective: To implement a secure.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Lecture 23 Symmetric Encryption
6. Practical Constructions of Symmetric-Key Primitives
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
1/17 Bluetooth Security Ain Shams University Faculty of Engineering Integrated Circuits Lab Presented by: Mohammed Abdelsattar Ismail Sameh Talal Magd-El-Din.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Information Security for Managers (Master MIS)
Basic Concepts of Cellular Networks and Mobile IP Aug 31, 2005.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
IWD2243 Wireless & Mobile Security Chapter 2 : Security in Traditional Wireless Network Prepared by : Zuraidy Adnan, FITM UNISEL1.
Security in GSM/GPRS and UMTS
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cellular Mobile Communication Systems Lecture 8
Feistel Cipher Structure
Network Security Lecture 4 Modes of Operation Waleed Ejaz
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
Lecture 23 Symmetric Encryption
Overview of cellular system
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Wireless Network PMIT- By-
GSM SECURITY AND ENCRYPTION
3G Security Principles Build on GSM security
Fundamentals of Cellular and Wireless Networks
By Theodora Kontogianni
GSM location updating procedure
Subject Name: GSM Subject Code: 10EC843
Introduction to Modern Symmetric-key Ciphers
GSM location updating procedure
Prof. Saravanan Vijayakumaran
Mobile Phone Technology
CH 6. Stream Ciphers Information Security & IoT Lab 김해용
Pseudorandom Numbers Network Security.
Special Topic: Wireless Security
LM 7. Cellular Network Security
Security in Wide Area Networks
Presentation transcript:

Siyang Tian

TOPIC 1.SIM CARD card embedded with subscriber identity module 2. 3G network 3rd generation mobile telecommunications

SIM CARD 3 most important serial numbers in SIM CARD: IMSI, ICCID and KI 1. IMSI:It is a unique identification associated with all GSM and UMTS network mobile phone users. 2.ICCID: integrated circuit card identifier. This serial number is used to identify the subscriber identity module 3.KI: The Ki is the individual subscriber authentication key. It is a 128-bit number that is paired with an IMSI when the SIM card is created. The Ki is only stored on the SIM card and at the Authentication Center (AuC). The Ki will never be transmitted across the network on any link.

KI IS THE MOST IMPORTANT NUMBER As IMSI and ICCD can be read from the SIM card directly by using a SIM card reader, KI is the most important serial number for your SIM Card security. Once the KI number of a SIM card is cracked, the SIM card can be cloned. By making a duplicate SIM card: 1.You can integrate more than one SIM card into one and switch from one to another by using one mobile phone. 2. Others can eavesdropping on your phone conversations, Voice mail, make calls charged to the your SIM, ect

AUTHENTICATION & ENCRYPTION RAND: a random 128-bit number that is generated by the AuC when the network requests to authenticate a subscriber. The RAND is used to generate the Signed Response (SRES) and Kc crypto-variables. A3 algorithm: it computes a 32-bit Signed Response (SRES). A8 algorithm: it computes computes a 64-bit ciphering key (Kc). COMP128: A keyed hash function that combines the A3 and A8 algorithms into a single function. The 128-bit Ki and 128-bit RAND are input into the COMP128 which generates a 32-bit SRES and a 54-bit Kc in a single function. COMP128 is weak because it can give away information about the Ki.

AUTHENTICATION & ENCRYPTION

3G NETWORK 3 algorithms were used: A5/1, A5/2 and A5/3 A5/1 and A5/2 are stream cipher. A5/3 is block cipher. A5/2 is much weaker than the other two

A5/1 The Linear feedback shift register LFSR is used to generate “expected” random numbers The period of a n bit LFSR is (2^n)-1. 00…0 is always forceclosed. A5/1: Stream cipher. Every random stream keys is used only once.

TAP: The bit positions that affect the next state are called the taps. The taps are XOR'd sequentially with the output bit and then fed back into the leftmost bit. The sequence of bits in the rightmost position is called the output stream 3 LFSR are used in A5/1 algorithm. They are LFSR1, LFSR2 and LFSR3

HOW KEY INVOLVED

Each register has an associated clocking bit(majority bit). Say, for LFSR1,2,3 they are x1,x2,x3 Majority function F: F(x1,x2,x3)=(y1,y2,y3) The majority function determines which LFSR is clocked. When clocked, bits that are not taps are shifted one position to the left unchanged. By using this stop/go control, it looks like that the 3LFSR generates number more randomly.

Majority bits: 11, 12, 13

Majority function F: F(x1,x2,x3)=(y1,y2,y3) For example, at time t, if F(a(t+11), b(t+12), c(t+13)) = (1, 1, 0) (y1, y2, y3) = (1, 1, 0), then LFSR 1 and LFSR 2 are clocked and LFSR 3 has no clock pulse.

KASUMI(A5/3) 8 round Feistel network. A block with 128-bit key and 64-bit input and output, which is also as known as A5/3 Input 64 bits I, I=L 0 ||R 0 where L 0, R 0 are 32 bits 128 bits key K=K1||K2||…||K8 Ki is 16 bits subkey

For 1,3,5,7 rounds: f i (I,RK i )=FO(FL(I,KL i ), KO i KI) For 2,4,6,8 rounds: f i (I,K i )=FL(FO(I, KO i, KI),KL)

Algorithm FL: 32bit input I and 32 bit sub key KL i KL i =KL i,1 ||KL i,2 where KL i,1 and KL i,2 are 16 bits ROL: rotate one bit left

Algorithm FO: 32bit input I and two 48 bits sub keys KO i and KI i KI i =KI i,1 ||KI i,2 ||KI i,3 where KI i,1, KI i,2 and KIi,3 are 16 bits KO i =KO i,1 ||KO i,2 ||KO i,3 where KO i,1, KO i,2 and KIi,3 are 16 bits

Algorithm FI: 16 bits input I and one 16 bits sub key KI i,j I is divided into L 0 and R 0. I= L 0 || R 0 L 0 is 9-bit and R 0 is 7 bit KI i,j is divided into L 0 and R 0. KI i,j = KI i,j,1,|| KI i,j,2 KI i,j,1 is 9 bits KI i,j,2 is 7 bits S7 and S9 boxes are used ZE(x) add 00 to x from right TR(x) remove the left most two bits

128 bits key K=K1||K2||…||K8 where Ki is 16 bits subkey Sub keys for each round

WHY IT IS SAFE Because of S7 and S9, a small change in one bit of the plain text will cause a large difference in the cypher text. Using FO and FI repeatedly in the Feistel structure will cause confusion and diffusion, it also provides the security

REFERENCE

QUESTION 1.What is a tap in LFSR? 2.For the majority function in A5/1. If the output of F is F(x1,x2,x3)=F(1,0,0), Which LFSR is clocked? 3.True or false: The Kasumi algorithm uses S8. 4.Which two of FO, FI,G8,RE and FL? 5.Why KI is the most important serial number in the SIM card?

QUESTION 1.What is a tap in LFSR? The bit positions that affect the next state are called the taps. 2.For the majority function in A5/1. If the output of F is F(x1,x2,x3)=F(1,0,0), Which LFSR is clocked? LFSR2 and LFSR3. 3.True or false: The Kasumi algorithm uses S8. False 4.Which two of FO, FI,G8,RE and FL? FO, FI. 5.Why KI is the most important serial number in the SIM card? Because the other two can be read directly by using a SIM card reader, and once Ki is cracked, the SIM card can be cloned.