3GPP GBA Overview Adrian Escott.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
AUTHENTICATION AND KEY DISTRIBUTION
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Pre-Shared Key TLS with GBA support Thesis presentation ESPOO, Finland.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
By: E. Susheel Chandar M. Guna Sekaran Intranet Mail Server.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
Summary of 3GPP TR GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Chapter 10: Authentication Guide to Computer Network Security.
Proposed High Level Solution for Device Binding 3GPP2 TSG-SX WG4 SX Source: Qualcomm Incorporated and Alcatel-Lucent Contact(s): Anand Palanigounder,
Wireless and Security CSCI 5857: Encoding and Encryption.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
1 R-UIM Support for Secure LBS (Stage 2) Zhimin Du Lijun Zhao zdu, QUALCOMM Incorporated June 20, 2005.
1x Device Binding Framework Overview to TSG-AC 3GPP2 TSG-AC AC Source: TSG-SX WG4 Contact(s): Anand Palanigounder,
Revised Solution for Device Binding Revised from S GPP2 TSG-SX WG4 SX Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Security Framework for (e)HRPD 1 S GPP2 TSG-S WG4 Source: QUALCOMM Incorporated Contact(s): Anand Palanigounder
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Chapter 21 Distributed System Security Copyright © 2008.
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Leveraging UICC with Open Mobile API for Secure Applications and Services.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Detailed analysis on MIA/MSA architecture Date Submitted: January 5, 2010 Present.
Proposed Solution for Device Binding 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Alec Brusilovsky, Zhibi Wang Alcatel-Lucent, July 24, 2007.
SARVAJANIK COLLEGE OF ENGINEERING & TECHNOLOGY. Secure Sockets Layer (SSL) Protocol Presented By Shivangi Modi Presented By Shivangi ModiCo-M(Shift-1)En.No
1/19 BCMCS Support In IS-820-C (Stage 2) Lijun Zhao QUALCOMM July 20th, 2004.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
Draft-ietf-dime-ikev2-psk-diameter-0draft-ietf-dime-ikev2-psk-diameter-08 draft-ietf-dime-ikev2-psk-diameter-09 in progress Diameter IKEv2 PSK: Pre-Shared.
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
Doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 1 cdma2000-WLAN Interworking Jim Tomcik Raymond Hsu
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Zhibi Wang January, 2007.
1 Understanding Secure Socket Layer (SSL) Advisor Advisor Prof. Tzonelih Hwang Presenter Prosanta Gope.
OneM2M Challenges of M2M Security and Privacy
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
User Notification Protocol Nikolai Leung, QUALCOMM Incorporated (703) Notice: QUALCOMM Incorporated grants.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Omniran CF00 1 Key Concepts of Authentication and Trust Establishment Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
NETLMM Applicability Draft (Summary) 28 Sep
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
1 On 3GPP2 Femto Security Anand Palanigounder Qualcomm Inc. Notice: Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Replay protection for CAVE based AKA when moving R-UIM between mobiles.
1 Example security systems n Kerberos n Secure shell.
WLAN IW Enhancement for Multiple Authentications Support QUALCOMM Inc.: Raymond Hsu, QUALCOMM Inc.: Masa Shirota,
Skype.
1 Rogue Mobile Shell Problem Verizon Wireless October 26, 2000 Christopher Carroll.
1 BCMCS Framework TSG-X BCMCS Adhoc August 20, 2003.
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Using SSL – Secure Socket Layer
Chinese wall model in the internet Environment
Presentation transcript:

3GPP GBA Overview Adrian Escott

Health Warning The details of interfaces may change but the overall the architecture is table.

Aims of GBA To provide shared keying material that can be used to secure some application between a mobile and a network work element Avoids the need to provision new keys for each new service Simplifies the development of new services, as there is a ready management method Re-uses the current developed authentication method to generate the shared key material Simplifies adding new services to old phone (that support GBA), as no change needed to UIM to support key management Also provide method of generating shared key material that doe not leave the UIM Methods being developed how to use GBA with different security mechanisms E.g Using GBA with TLS, proposed for Presence Security

GBA Specifications S.P0112 General Bootstrapping Architecture Requirements Contains high level system requirements for GBA S.P0109 General Bootstrapping Architecture Contains the architecture and architectural level requirements for GBA Contains description of bootstrapping procedures, Zn and Zh interfaces S.P0114 “Security Mechanisms using GBA” Will contain descriptions of using GBA with various security protocols, i.e. Ua interface Initial protocols will include TLS and Digest(?)

GBA Architecture Bootstrapping Server Function (BSF) and UE mutually authenticate and agree on a shared key. Once that shared key is available, UE and Network Application Function (NAF) can communicate securely using a key material derived from this shared key. HSS/HLR/AAA are used to provide the necessary data for BSF and UE to authenticate each other and generate shared key.

GBA message flows HSS/HLR/AAA BSF NAF UE 4. BSF request authentication info 6. NAF requests key from BSF 7. BSF sends key to NAF BSF NAF 8. NAF send response 5. UE send request including B-TID 2. NAF responds with request for bootstrapping 3. UE and BSF perform bootstrapping UE 1. UE contacts NAF for service

Ub interface Interface over which UE and BSF generate shared key Will use HTTP Digest for CAVE and CHAP based bootstrapping and HTTP DIGEST AKA for AKA based bootstrapping BSF selects bootstrapping method when UE supports more than one included. Covered in S.P0109 Additional methods of bootstrapping could be supported provided that they Result in key shared between UE and BSF Allow the Bootstrapping Transaction Identity (B-TID) to be sent to the UE Allow the Key expiry time to be sent to the UE

Bootstrapping with AKA

Bootstrapping in CDMA 1x (with CAVE) – SMEKEY is used as password 1x Terminal CAVE GAA BSF (H-AAA) HLR/AC Ub Zh 1. GET / HTTP/1.1 Authorization: Digest username=“IMSI@realm.com” 2. Generate RAND (the global challenge) 3. HTTP/1.1 401 Not authorized WWW-Authenticate: Digest nonce=“<RAND>”, qop=“auth-int”, … 4. RAND 5. AUTHR, SMEKEY, … 6. Set parameters: MS_PW = SMEKEY H1’(MS_PW) • gx mod p x is secret random number generated by UE 7. GET / HTTP/1.1 Authorization: Digest nonce=“<RAND>”, response=“<MS_PW used as passwd>”, qop=auth-int, … (in HTTP playload “H1’(MS_PWD) • gx mod p” is delivered, and AUTHR) 8. AUTHREQ (AUTHR, RAND, …) 9. Verifies RAND/AUTHR, generates SMEKEY 10. Authreq (SMEKEY, …) 11. Set parameters: BS_PW = SMEKEY H1’(BS_PW) • gy mod p y is secret random number generated by UE 12. Generate GAA master key (Ks) from BS_PW (the same way as WKEY). 13. HTTP/1.1 200 OK Authentication-Info: Digest respauth=“<BS_PW used as passwd>, qop=auth-int, , … (in HTTP playload “H1’(BS_PW) • gy mod p”, B-TID, and key lifetime are delivered) 14. Generate GAA master key (Ks) from PS_PW (the same way as WKEY).

Bootstrapping in CDMA 1x EvDo (with CHAP) – MN-AAA Authenticator is used as password

Ua interface This is the interface that will use the keys to secure the protocol Details will be specified in S.P0114 Idea is keep this very general and make reference to it in Service specific document. E.g. specify how to use TLS with GBA in S.P0114 and reference this in a service specification. Location (X.P0024 and S.P0110) are an example of this in practice. In general it is necessary to include the following in a protocol to enable it to use GBA keys The UE and NAF agree on the name of the NAF The UE needs to pass the B-TID to the NAF The NAF needs to fetch the GBA derived key from the BSF once it has the B-TID. The NAF may need to interact with the BSF to generate its GBA key (optional) The NAF indicates to the UE that it can use bootstrapping (optional)

Zn interface This is used by the NAF to request keys and other related information from the BSF There is only one type of interaction on this interface NAF sends B-TID, NAF-ID, Random numbers (optional) , … to the BSF BSF calculate Ks_NAF (key for that particluar NAF) using shared key, NAF-ID etc BSF responds with Ks_NAF, Key lifetime and User Security Settings (application related data that is needed by NAF, e.g. user identity)

Zh interface Zh interface is used to retrieve authentication information from the relevant entity Assumption that BSF is always in home

GBA_U GBA establishes session keys between the ME and the NAF An enhanced version called GBA_U allows keys to be established between UIM and NAF The keys are not revealed outside the UIM The application-specific NAF protocol is implemented on the UIM This enhancement offers a higher level of security which is needed for certain applications, e.g. for BCMCS if GBA was used to provide RK. Method for AKA has been accepted It was agreed not to modify CAVE to do GBA_U A method for CHAPS is FFS.

Using GBA GBA with TLS GBA with Digest TLS PSK using GBA generated keys Use GBA keys as Pre-shared Keys for TLS Certificate based server authentication with Digest based client authentication Certificate management issues Must ensure tunnel endpoints are the same GBA with Digest Needed for second of above – useful in own right? If so, could be included in S.P0114