GSM Security and Encryption

Slides:



Advertisements
Similar presentations
GSM Network Overview Um Abis A BSC BTS Mobile Station HLR VLR EIR AuC
Advertisements

GSM.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
Kingdom Special Operations SJS-KW
GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
Topics In Information Security Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication Presented by Idan Sheetrit
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
GSM Adapted from Acoe 422. History of GSM  During the 80s, analog cellular systems experienced rapid growth in Europe, yet they were incompatible.
Presentation on GSM Regional Telecom Training Centre Nikhilesh Mohanty
By Neha choudhary Asst.Professor CSE/IT LHST-A.  GSM-Introduction  Architecture  Technical Specifications  Characteristics and features  Applications.
GSM System Architecture
GSM standard (continued)
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
Modes Mobile Station ( MS )
First and Second Generation
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION Debby Nahl Fall 2004.
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
TEL 355: Communication and Information Systems in Organizations
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
GUIDED BY:- MR. SURESH DHRUWEY SUBMITTED BY:- Ankita Jain Tulika Prasad Vandana Bind Hemant Kumari Aishwarya Jain.
17.1 Cellular Telephony Frequency Reuse Principle Transmitting Receiving Handoff Roaming First Generation Second Generation Third Generation Cellular telephony.
GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications.
Basic Concepts of Cellular Networks and Mobile IP Aug 31, 2005.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications.
GSM,GPRS & CDMA Technology
GSM Network Structure Lance Westberg.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Cellular Mobile Communication Systems Lecture 8
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
Wireless Communications Technology Lesson 5: GSM Bellevue Community College Bob Young, Instructor.
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
GSM Network Architecture
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Overview of cellular system
(Global System for Mobile Communication)
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
Cellular Network Base stations transmit to and receive from mobiles at the assigned spectrum Multiple base stations use the same spectrum The service area.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
Bitwali1 Wireless Communication Introduction to Mobile Communication and Cellular System Lecture 3-4.
Overview of the GSM for Cellular System
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GPS.
GSM.
Global System for Mobile Communications
GSM SECURITY AND ENCRYPTION
GSM,GPRS & CDMA Technology
GSM.
GSM location updating procedure
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM location updating procedure
GSM – GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Dept. of Business Administration
Security in Wide Area Networks
Presentation transcript:

GSM Security and Encryption David Margrave George Mason University “…The use of authentication, encryption, and temporary identification numbers ensure the privacy and anonymity of the system’s users, as well as safeguarding the system…” Reviewer: Jihong Li

GSM Security and Encryption Introduction of GSM Structure of GSM Overview of Cryptography Security Features of GSM Conclusion

Introduction History of GSM 1982: A study group, Group Special Mobile formed by CEPT 1990: Phase I GSM specification 1991: Commercial service 1997: North America entry, Global System for Mobile communication Feature of GSM Total Mobility High capacity and Optimal Spectrum Allocation Security Service: telephony, data service, SMS, supplemental services

Structure of GSM Mobile Station Base Station Subsystem Base Transceiver Station Base Station Controller Network and Switching Subsystem Mobile services Switching Center Home Location Register Visitor Location Register Authentication Center (help to verify the user’s identity) Equipment Identity Register (contains a list of all valid terminals) Operation and Support Subsystem (control and monitor, traffic load of the BSS)

Overview of Cryptography Symmetric Algorithms Encryption and decryption use the same key Block ciphers: encrypt or decrypt data in blocks or groups of bits. (DES) Stream ciphers: on a bit by bit basis. XOR with the keystream Public Key Algorithm Data encrypted with a given public key, decrypted with the corresponding private key. “one way trap-door” function, factorization problem One- way Hash Function (GSM authentication method) message hash private key signature public key message hash

Security Features of GSM Aspects of security Subscriber identity authentication Subscriber identity confidentiality Signaling and user data confidentiality System elements SIM: IMSI (International Mobile Subscriber Identity) Ki ( individual subscriber authentication key) A8 ( ciphering key generation algorithm) A3 ( authentication algorithm) PIN Handset: A5 (ciphering algorithm) GSM network: AUC consists IMSI, TMSI, LAI (location area identity), and Ki EIR consists white-listed, grey-listed, and black-listed

Security Features of GSM Subscriber identity authentication AUC: send 128 bit RAND MS (SIM): 128 bit + A3 + Ki = 32 bit AUC: re-calculate to verify, check EIR, agree, write information to HLR VLR Signaling and user data confidentiality Between MS and BSS: SIM: A8 + RAND + Ki = 64 bit ciphering key (Kc) Between MS and NSS: A5 + Kc + data Kc may be changed at regular intervals as required by network design and security consideration Subscriber identity confidentiality Same area: TMSI ( Temporary Mobile Subscriber Identity) Different area: TMSI + LAI (Location Area Identification) “… such that the sensitive information is never transmitted over the radio channel…”

Conclusion Even with no encryption, GSM is more secure than analog system by using the speech coding, digital modulation and TDMA GSM’s security methods (authentication, encryption, and temporary identification number) ensure the privacy and anonymity of the system users, as well as safeguarding against fraudulent use. My experience is that GSM security adds complexity to the system implement. And the current systems have different kinds of defect

Question? Do you feel unsafe when you use the mobile phone?