Security in e 1
Outline e Security Introduction e Network Architecture Security Architecture X.509 cerf. PKMv1 RSA Authentication PKMv2 RSA based Authentication EAP based Authentication Double EAP Authentication RSA and EAP Authentication 2
802.16e Network Architecture 3
802.16e Network model 4
Security Architecture Encapsulation protocol A set of supported cryptographic suites The rules for applying those algorithms to a MAC PDU payload Key management protocol Providing the secure distribution of keying data from the BS to the SS Authentication protocol RSA authentication protocol Extensible Authentica5555tion Protocol 5
Supported Cryptographic suites in e Data Encryption/key Length (Bits) Data AuthenticationTEK Encryption/Key Length (Bits) None 3-DES/128 DES CBC/56None3-DES/128 None RSA/1024 DES CBC/56NoneRSA/1024 AES CCM/128 AES ECB/128 AES CCM/128 AES key wrap/128 AES CBC/128NoneAES ECB/128 AES CTR/128NoneAES ECB/128 AES CTR/128NoneAES key wrap/128 DES: Data Encryption ; AES: Advanced Encryption Standard ; CBC: Cipher Block-Chaining ; CTR: Counter ; ECB: Electronic Codebook 6
Cryptographic technology PKMv1PKMv2 Data En/Decryption56 bit CBC-Mode DES 128 bit CCM-Mode AES 128 bit CBC-Mode AES 128 bit CTR-Mode AES Data AuthenticationNot Support128 bit CCM-Mode AES Key GenerationNot DefineDot16KDF Key En/Decryption128bit EDE-Mode 3-DES 1024 bit RSA 128 bit ECB-Mode AES 128 bit AES-Key-Wrap 7
X.509 certificate 8
Private Key Management PKMv1 Use in d Only support RSA authentication Only BS can authenticate SS PKMv2 Support EAP authentication and RSA authentication MBS (Multimedia Broadcast Services) Key hierarchy New cryptographic technology BS has a certificate BS and SS can authenticate each other 9
PKMv1-Authentication and Authorization 10
PKMv1: Re-authentication Re-authentication 相較於開始的 authentication 少了傳送 Authentication information 這個步驟 為了避免中斷 SS 和 BS 之間的服務或連線, SS 會在 key lifetime 快到的時候傳送 Authorization request 過去, 然後 BS 和 SS 會同時啟動新的 AK 11
PKMv1:TEK exchange BS Key Request Key Reply [SS Certificate, SAID, HMAC-Digest] [Key-Sequence-Number, SAID, TEK- Parameters, HMAC-Digest] Encrypted Data Encrypt TEK with SS’s public key 12
Key hierarchy The PKMv2 defines hierarchy for keys Pre-PAK (pre-Primary AK) yielded by the RSA-based authorization process MSK yielded by the EAP based authentication process MBSAK from which keys used to protect MBS traffic are derived. 13
Key hierarchy (cont.) Pre-PAK: pre-Primary AKMTK: MBS Transport Key AK: AuthorizationEIK: EAP Integrity Key MAK: Multicast and Broadcast Service AK MGTEK: MBS Group Traffic Encryption Key KEK: Key Encryption KeyTEK: Traffic Encryption Key GKEK: Group Key Encryption Key GTEK: Group Traffic Encryption Key 14
PKMv2: RSA-based Authentication BS Authentication Information Authorization Request [Cert(manufacturer)] [Cert(MS), Security-Capabilities, MSRandom(64bits),SAID] Authorization Reply [Cert(BS),pre-PAK,PAK-Lifetime,PAK- SeqNumber,MSRandom,SA-Descriptor(s), BSRandom] Authorization ACK 15
PKMv2: RSA-based Authentication (cont.) RSA based authentication EIK|PAK <= Dot16KDF(pre-PAK,SS MAC address | BSID | ” EIK+PAK ”, 320) AK<= Dot16KDF(PAK,SS MAC address | BSID | PAK| ” AK ”,160) 16
PKMv2: EAP Authentication 17
PKMv2: EAP Authentication One level EAP based authentication Using the authentication exchange message to get MSK (Master session key) PMK<= truncate(MSK,160) AK<=Dot16KDF(PMK,SS MAC Address | BSID | “ AK ”,160) 18
PKMv2:Two level EAP Authentication Step1: SS->BS: PKMv2_EAP_START (no attribute) SS BS: First round EAP conversation with PKMv2 EAP Transfer message without HMAC/CMAC Digest BS->SS:EAP_success BS->SS:EAP_complete [EAP payload|signed by EIK] Step2: SS->BS:PKMv2_EAP_START signed by EIK BS->SS:PKMv2 Authenticated EAP [EAP- Identity/Request] SS BS:Second EAP conversation with PKMv2 Authenticated EAP message signed by EIK 當 Step2 success SS 和 BS 可以 generate AK from PMK1 and PMK2 19
PKMv2 AK key derivation: Two level EAP- based 20
PKMv2:Two level EAP Reauthentication 21 Step1: SS->BS: PKMv2 EAP Start signed by H/CMAC Key_U SS BS: EAP conversation with PKMv2 EAP Transfer message BS->SS: PKMv2 EAP Complete signed by AK Step2: SS->BS: PKMv2 EAP Start signed by H/CMAC_Key_U SS BS: PKMv2 EAP Transfer signed by AK
PKMv2 :RSA+EAP based Authentication First round :execute RSA-based authorization Second round:execute Double EAP mode 22
PKMv2 AK key derivation:RSA+EAP based 23
KEK and Message Authentication code generation 24
KEK and Message Authentication code generation (cont.) 25
PKMv2: SA-TEK 3-Way handshake 26
Conclusion 27 Authentication & authorization It improves single authentication to become mutual authentication between SS and BS It reduces the possibility of fake BS attack Data privacy IEEE e add secure encryption standard such as AES-key- wraps. Key exchange Add new method to protect integrity and support MBS