Download presentation
Presentation is loading. Please wait.
Published byBrice Edwards Modified over 9 years ago
1
1/xx AKA Support In IS-820-B Stage 2 Lijun Zhao QUALCOMM Incorporated Apr 14, 2003 Notice QUALCOMM Incorporated grants a free, irrevocable license to 3GPP2 and its Organization Partners to incorporate text or other copyrightable material contained in the contribution and any modifications thereof in the creation of 3GPP2 publications; to copyright and sell in Organizational Partner’s name any Organizational Partner’s standards publication even though it may include portions of the contribution; and at the Organization Partner’s sole discretion to permit others to reproduce in whole or in part such contributions or the resulting Organizational Partner’s standards publication. QUALCOMM Incorporated is also willing to grant licenses under such contributor copyrights to third parties on reasonable, non-discriminatory terms and conditions for purpose of practicing an Organizational Partner’s standard which incorporates this contribution. This document has been prepared by QUALCOMM Incorporated to assist the development of specifications by 3GPP2. It is proposed to the Committee as a basis for discussion and is not to be construed as a binding proposal on QUALCOMM Incorporated. QUALCOMM Incorporated specifically reserves the right to amend or modify the material contained herein and nothing herein shall be construed as conferring or offering licenses or rights with respect to any intellectual property of QUALCOMM Incorporated other than provided in the copyright statement above.
2
2/xx Outline UIM Vs.ME in terms of AKA New UIM EFs New Commands/Responses Call Flow Further Work Refernce
3
3/xx ME Vs. UIM in terms of AKA
4
4/xx ME’s Responsibility Perform Message Integrity and Ciphering Pass RANDA, AUTN of AV to R-UIM Pass MAC-I to R-UIM to generate UMAC Keep track of 2 sets of keys and corresponding KEY IDs.
5
5/xx Computation Of MAC-I.
6
6/xx UIM’s Responsibility Compute IK,CK and pass them to ME Compute RES with variable length and pass them to ME. Compute MACA to authenticate the BS Compute UAK, to which ME does not have access Compute UMAC and pass it to the ME Store 3G key in Elementary File Store UAK hidden from ME Store Threshold/Start Value in Elementary Files Store sequence number hidden from ME Validate CON_SEQ and start re-sync if necessary Sequence number management
7
7/xx UIM’s Computation –Generate MACA: f1 –Generate RES: f2 –Generate CK: f3 –Generate IK: f4 –Generate AK: f5 –Generate UAK: f11
8
8/xx New UIM Elementary Files
9
9/xx 3 New UIM EFs 3GCIK: {16-byte CK, 16-byte IK} THRESHOLD {Maximum value of START} START {START}
10
10/xx EF: 3GCIK EF 3GCIK (3GCIK) contains the (CK,IK) –Identifier: '6F55' –Structure: transparent –Mandatory –File size: 32 bytes –Update activity: low
11
11/xx EF:THRESHOLD EF THRESHOLD (THRESHOLD) contains the maximum value of START. This value is used to control the lifetime of the keys in EF 3GCIK –Identifier: '6F56' –Structure: transparent –Mandatory –File size: TBD bytes –Update activity: low
12
12/xx EF:START EF START (START) contains the value of START. This value is used to control the lifetime of the keys in EF 3GCIK. –Identifier: '6F57' –Structure: transparent –Mandatory –File size: TBD bytes –Update activity: high
13
13/xx ACCESS CONDITIONS 3GCIK READCHV1 UPDATEADM INVALIDATEADM REHABILITATEADM THRESHOLDSTART CHV1 ADMCHV1 ADM
14
14/xx New Commands/Responses
15
15/xx 3G Authenticate Command Parameters: {RANDA, AUTN: CON_SEQ, AMF, MAC-A} Response Parameters: {Success Tag, CK, IK, RES LENGTH, RES, AUTS}
16
16/xx Response of UIM to 3G Authenticate Command Compute AK and retrieve SQN from CON_SEQ sent in AUTN Compute MACA, which may trigger to send Auth Reject (Status Word X) Check if SQN is valid, which may trigger to send Sync Failure (Status Word Y, AUTS: CON_MS_SEQ, MAC_S=f1* {RAND, AMF, SQN} ) If both MACA and SQN are valid, send Auth Response
17
17/xx Generate UMAC Command Parameters: {MACI} Response Parameters: {Success Tag, UMAC}
18
18/xx UAK/UMAC UAK shall be generated together with CK, IK when processing AV if UIM supports UAK If ME sends a Generate UMAC command, and UIM does not support UAK, UIM responds with an error code “UAK is not supported” and no UMAC is returned
19
19/xx Call Flow
20
20/xx Modified 2G Authentication
21
21/xx AKA
22
22/xx AV SEQ Re-sync
23
23/xx UMAC/UAK *: if supported by UIM
24
24/xx Key Restoration
25
25/xx Further Work
26
26/xx What is next…. Define details/structures of EFs, and Command/Responses Write the procedures of the functions: (We can refer to C.S0055 with some descriptions of the functions included in IS-820-B) –Generate MACA –Generate RES –Generate IK,CK –Generate AK –Generate UAK Fine Tuning: Such as Exception/error handling, Result Code, Status Words…
27
27/xx Reference S.S0055 Enhanced Cryptographic Algorithms, Revision B S.S0053-0 Common Cryptographic Algorithms, Revision D C.S0005-C Upper Layer(Layer 3) Signaling Standard for cdma2000 Spread Spectrum Systems C.S00023-A Removable User Identity Module for Spread Spectrum Systems
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.