GSM Security Threats and Countermeasures Saravanan Bala Tanvir Ahmed Samuel Solomon Travis Atkison.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

1 KCipher-2 KDDI R&D Laboratories Inc.. ©KDDI R&D Laboratories Inc. All rights Reserved. 2 Introduction LFSR-based stream ciphers Linear recurrence between.
Off-the-Record Communication, or, Why Not To Use PGP
“Advanced Encryption Standard” & “Modes of Operation”
GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
AN IMPROVEMENT TO A CORRELATION ATTACK ON A5/1 H. Nikoonia, F. Amin, A. H. Jahangir Computer Engineering Department, Sharif University of Technology.
LINEAR FEEDBACK SHIFT REGISTERS, GALOIS FIELDS, AND STREAM CIPHERS Mike Thomsen Cryptography II May 14 th, 2012.
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Wired Equivalent Privacy (WEP)
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Stream Ciphers 1 Stream Ciphers. Stream Ciphers 2 Stream Ciphers  Generalization of one-time pad  Trade provable security for practicality  Stream.
Chapter 8 Network Security 4/17/2017
Network Security Chapter
AES Proposal: Rijndael Joan Daemen Vincent Rijmen “Rijndael is expected, for all key and block lengths defined, to behave as good as can be expected from.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Chapter 20 Symmetric Encryption and Message Confidentiality.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Fast Memory Addressing Scheme for Radix-4 FFT Implementation Presented by Cheng-Chien Wu, Master Student of CSIE,CCU 1 Author: Xin Xiao, Erdal Oruklu and.
WEP Protocol Weaknesses and Vulnerabilities
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
©KDDI R&D Laboratories Inc. ALL Rights Reserved. Cryptanalysis on Clock Controlled Stream Ciphers Shinsaku Kiyomoto KDDI R&D Laboratories Inc
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
Lecture 2: Introduction to Cryptography
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 2 Symmetric Encryption.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Space Data Link Secure Protocol Interoperability Testing Interfaces Definition Proposal Bruno Saba DCT/TV/IN 26/04/2010.
Cryptography and Network Security
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
University of Malawi, Chancellor College
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
Triple DES.
Chapter 8 Network Security.
Chapter 8 Network Security.
STREAM CIPHERS by Jennifer Seberry.
Presentation transcript:

GSM Security Threats and Countermeasures Saravanan Bala Tanvir Ahmed Samuel Solomon Travis Atkison

Outline  Introduction  A5/1 algorithm  Security & attacks  Proposed Solution  Hardware Enhancement  Software Application  Conclusion

Mobile Communication-GSM  Most widely used cellular technology  Cryptographic Algorithms- A5/1, A5/2, A5/3  A5/1 Algorithm provides over the air privacy

A5/1 GSM phone conversations: sequences of frames. One 228 bit = frame is sent in 4.6 milliseconds: 114 bits for the communication in each direction. A5/1 produces 228 bits to XOR with the plaintext in each frame

A5/1 LFSRs Consists of 3 LFSRs of different lengths 19 bits x 18 + x 17 + x 16 + x clock bit 8 tapped bits: 13, 16, 17, bits x 21 + x clock bit 10 tapped bits 20, bits x 22 + x 21 + x 20 + x clock bit 10 tapped bits 7, 20, 21, 22

A5/1 - Clocking

A5/1 clocking  Majority rule  m=maj(c1, c2, c3)  m=maj(1, 1, 0)  maj = 1  Registers R1 & R2

Design Vulnerability  Design of Clock Controlling Unit  Linear Combination Function

Possible Attacks  Chosen plain Text attacks  Time memory trade off attacks  Correlation attacks

Proposed Counter Measures  Hardware Enhancement  Software Application- Additional Encryption

Hardware Enhancement

Contd..  Enhanced Majority Rule  Computes two majority values  m1=maj(b1, b2, b3)  m2=maj(c1, c2, c3)  Let S1 = { } and S2 = { } (Imaginary sets)  S1∩S2

Contd..  Linear combining functions are cryptographically weak functions  Non Linear Combining Function  Combining function not fixed - changed dynamically by using a 2:1 multiplexer.

Software Application  End to end encryption  Encrypt speech signal at user end  Solution includes using transmission of encrypted voice GSM Data Call CSW  Example : SecureGSM  Another solution includes usage of connection based packet switching.  Example : Babylon nG  Both techniques use Diffie-Hellman key agreement protocol for ciphering key exchange and AES cipher for encryption of voice.  Experimentally proved that the implementation of AES cipher provides more robust and efficient system.

CONCLUSION  Proposed scheme generates cryptographically better key sequence than the current version of A5/1  Future mobile communications can be handled using UMTS

REFERENCES [1] “Secure Mobile Communication Using Low Bit-Rate Coding Method”. IEEE paper published by Wasif, M.; Sanghavi, C.R.; Elahi, M.; [2] “Another attack on A5/1”. IEEE paper published by Patrik Ekdahl and Thomas Johansson. [3] “Enhanced A5/1 Cipher with Improved Linear Complexity”. IEEE paper published by Musheer Ahmad and Izharuddin. [4] “Introduction to the design & analysis of algorithms” by Anany Levitin. [5] Based on the presentation given by Karsten Nohl on the “26th Chaos Communication Congress (26C3)” conference. [6] “Security Enhancements in GSM Cellular Standard”. IEEE paper published by Musheer Ahmad and Izharuddin. [7] “Communication Security in GSM Networks” published on 2008 international conference on security technology by Petr Bouška, Martin Drahanský. [8] “Implementation and Analysis of AES, DES and Triple DES on GSM network” an IEEE paper published by Sachin and Dinesh kumar [9] “Construction of nonlinear Boolean functions with important Cryptographic properties - Advances in Cryptology” by Sarkar and Maitra. [10] Diagram in slide number 6 taken from wikipedia.

Questions ????

Thank you all