07 Tm2201eu04tm 0002 Security Features
07 Tm2201eu04tm 0002 Security Features
07 Tm2201eu04tm 0002 Security Features
Security Features
Contents
1 Overview 3
2 IMEI Check 9
3 (P-)TMSI Allocation 15
4 Authentication 21
5 Ciphering & Integrity Check 35
6 Exercise 47
7 Solution 53
TM2201EU04TM_0002
1
© 2002 Siemens AG
Siemens Security Features
2 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
1 Overview
II)
ME I) I) I)
I) USIM
AN SN HE
III) I) Access Serving Home
Network Network Environment
III) User Domain
Security: IV) Application Domain Security:
secures access to MS enables applications in the user & provider domain to
(e.g. PIN) securely exchange messages (e.g. USIM ATK messages)
IV)
Fig. 1
TM2201EU04TM_0002
3
© 2002 Siemens AG
Siemens Security Features
4 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
TS
TS21.133:
21.133:
Security
SecurityThreats
Threats&&Requirements
Requirements
TS
TS33.102
33.102
Security
SecurityArchitecture
Architecture
TS
TS33.120
33.120
Security
SecurityPrinciples
Principles&& Objectives
Objectives
Fig. 2
TM2201EU04TM_0002
5
© 2002 Siemens AG
Siemens Security Features
6 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Network Access
Security Features
CS Domain Authentication
TMSI / P-TMSI Allocation - User Authentication:
- allocated by VLR / SGSN instead of IMSI
MSC/ network checks real PSTN
user identity;
- protects user identity & location confidentiality
GMSC
prevents misuse / misappropriation
VLR of network resources / services
ISDN
- Network Authentication:
UE checks network authorisation
IMEI Check to provide service
prevents usage of
stolen / not allowed ME
EIR HLR AuC
Node B R
N
C
UE Ciphering IP
= prevents eavesdropping of SGSN GGSN
ME user data / signaling on Uu PS Domain
+ X.25
USIM Data Integrity Check
provides security against unauthorised
modification of signaling data /
change of data origin
Fig. 3
TM2201EU04TM_0002
7
© 2002 Siemens AG
Siemens Security Features
8 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
2 IMEI Check
ME
ME
stolen TS
TS23.002,
23.002,
ME 23.003,
23.003,23.060,
23.060,
not 24.008,
24.008,29.002
29.002
allowed
IMEI Check
Fig. 4
TM2201EU04TM_0002
9
© 2002 Siemens AG
Siemens Security Features
IMEI Check
The IMEI Check is an optional feature, which can be used to prevent the usage of
stolen or not allowed mobile equipment. This feature remains the same as in GSM.
The Equipment Identity Register EIR (TS 23.002) is responsible for storing the
IMEIs in the network. The ME is classified as "white listed", "gray listed", "black listed"
or it may be unknown as specified in TS 22.016 and TS 29.002.
The white list is composed of all number series of equipment identities that are
permitted for use. The black list contains all equipment identities that belong to
equipment that need to be barred. Besides the black and white list, administrations
have the possibility to use a gray list. Equipment on the gray list are not barred, but
are tracked by the network (for evaluation or other purposes).
An EIR shall as a minimum contain a "white list".
10 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
IMEI Check
IMEI Check
(optional) EIR:
white / gray / black list
EIR:
EIR:
not in case of
TS
TS23.002
ME emergency calls 23.002
IMEI(SV):
IMEISV: IMEI & Software Version number
IMEI(SV):
TS
TS23.003
23.003
TAC FAC SNR SVN
Type Approval Code Final Assembly Code Serial Number 2 digit = 8 Bit
6 digits = 24 Bit 2 digits = 8 Bit 6 digits = 24 Bit
Fig. 5
TM2201EU04TM_0002
11
© 2002 Siemens AG
Siemens Security Features
12 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
IMEI Check
Authentication TS
TS33.102
33.102
IMEI
IMEICheck
Check
• •optional
optional
• •after
afterauthentication
1) Identity Request • •totobe
authentication
2) Identity Request beperformed
performedatatany
anyaccess
accessattempt
attempt
[Identity Type] &&during
duringestablished
establishedcalls
callsatatany
anytime
time
• •not
notinincase
caseofofemergency
emergencycalls
calls
• •not
notatatIMSI
IMSIDetach
Detach
3) Identity Response
[IMEI/IMEISV] 4) Identity Response
5) Check IMEI
[IMEI/IMEISV]
Decision: TS
TS29.002
29.002
Continue / Block
S- VLR
UE RNC EIR
SGSN
Fig. 6
TM2201EU04TM_0002
13
© 2002 Siemens AG
Siemens Security Features
14 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
3 (P-)TMSI Allocation
MSC/VLR
TMSI
P-TMS
I
ME SGSN
IMSI? Þ
TS
TS23.002,
Mr. / Ms. XY! 23.002,
23.003,
23.003,23.060,
23.060,
24.008,
24.008,29.002
29.002
(P-)TMSI Allocation
Fig. 7
TM2201EU04TM_0002
15
© 2002 Siemens AG
Siemens Security Features
(P-)TMSI Allocation
A unique International Mobile Subscriber Identity IMSI shall be allocated to each
mobile subscriber in the GSM system.
To achieve user identity confidentiality and user location confidentiality, the user is
normally identified by a temporary identity (Temporary Mobile Subscriber Identity
TMSI or Packet-TMSI) by which he is known by the Serving Network SN. To avoid
user traceability, which may lead to compromise of user identity confidentiality, the
user should not be identified for a long period by means of the same (P-) TMSI (TS
33.102). (P-)TMSI should be used at any Location Update Request, Service Request,
Detach Request, connection re-establishment request, etc.
A (P-)TMSI has local significance only in the LAI or RAI in which to user is registered.
Outside that area it should be accompanied by an appropriate LAII or RAI in order
avoid ambiguities. The association between IMSI and TMSI / P-TMSI is kept by the
VLR / SGSN in which the user is registered.
IMSI structure
The IMSI is composed of three parts: Mobile Country Code MCC, Mobile Network
Code MNC and Mobile Subscriber Identity Code MSIN. The MCC (3 digits; CCITT
administered) identifies uniquely the country of the mobile subscriber. The MNC (2
digits) identifies the Home PLMN of the mobile subscriber. The MSIN identifies the
mobile subscriber within a GSM PLMN. The IMSI shall consist of numerical
characters (O through 9) only. The overall number of digits in IMSI shall not exceed
15 digits.
(P-)TMSI structure
Since the (P-)TMSI has only local significance (i.e. within a VLR/SGSN area), the
structure and coding of it can be chosen by agreement between operator and
manufacturer in order to meet local needs. The P-TMSI / TMSI consists of 3 / 4
octets. It can be coded using a full hexadecimal representation.
16 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Packet-TMSI
3 bytes SGSN
TMSI
4 bytes VLR
UE MCC: Mobile Country Code
MNC: Mobile Network Code
MSIN: Mobile Subscriber
Identification Number
Fig. 8
TM2201EU04TM_0002
17
© 2002 Siemens AG
Siemens Security Features
18 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Paging Paging
Paging
[(IMSI) / (P-)TMSI, Paging Cause]
S- VLR
UE *e.g. LUP, RUP, Attach,
Detach, Service Request RNC TS
TS23.060
23.060 SGSN
NAS: Non-Access Stratum
Fig. 9
TM2201EU04TM_0002
19
© 2002 Siemens AG
Siemens Security Features
20 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
4 Authentication
USIM AuC
AN SN HE
ME Access Serving Home
Network Network Environment
enhanced
mechanism
& keys
TS
TS33.102
33.102
Authentication
Fig. 10
TM2201EU04TM_0002
21
© 2002 Siemens AG
Siemens Security Features
Authentication
In UMTS different to GSM both sides of the radio transmission check the correct
identity of their counterpart. Not only the user identity is checked by the Serving
Network SN. Additionally, the authorization of the SN to provide services is checked
by the UE. Both, user and network authentication should occur at each connection
set-up (TS 33.102).
So the objective of the Authentication process is to enable User Authentication
similar to the GSM Authentication and additionally Network Authentication.
Furthermore, the Authentication process provides the keys for Ciphering and
Integrity Check to the User Equipment UE.
The authentication process should occur at each connection set-up between the user
and the network.
It has been chosen in such a way to achieve maximum compatibility with the GSM
security architecture and facilitate migration from GSM to UMTS.
Nevertheless, the security mechanism and keys for authentication have been
enhanced significantly.
22 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
User&&Network
Network
User Authentication: Authentication User
Authentication
Authentication
User identity alright? Basics shouldoccur
should occuratateach
connectionset-up
each
set-up
connection
USIM AuC
New! AN SN HE
Access Serving Home
Network Network Environment
Fig. 11
TM2201EU04TM_0002
23
© 2002 Siemens AG
Siemens Security Features
24 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Basic Principles
K
secret Key
128 bit length
IMSI Þ K;
f1...f5
Authentication AuC
Data Request [IMSI]
USIM Authentication HLR
Data Response
[AV(1..n)]
VLR / SGSN
Authentication Request
[Authentication Parameter] Authentication Vector
Network / Quintet
Authentication Authentication Response
User
Authentication
K: secret Key
Visited PLMN Home PLMN SQN: Sequence Number
f1...f5: message authentication /
key generating Functions
Fig. 12
TM2201EU04TM_0002
25
© 2002 Siemens AG
Siemens Security Features
Authentication Vector AV
Each Authentication Vector consists of the following components (TS 33.102):
l a Random Number RAND, which is randomly generated, i.e. non-predictable. It’s
length is 128 bit.
l an Expected Response XRES, which is used for User Authentication. It shall
have a flexible length of 32 – 128 bit.
l a Cipher Key CK, which is necessary for Ciphering. It shall have a fixed length of
128 bit.
l an Integrity Key IK, which is used for Signaling Data Integrity Check. It’s length is
128 bit.
l an Authentication Token AUTN, which is used for Network Authentication. AUTN
consists of three different parts, described later on. Its total length is 128 bit.
26 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Authentication Vector AV
• consisting of 3 parts
Used for data • Used for network
randomly generated, Used for user Used for
authentication
i.e. non-predictable authentication encryption integrity check
Authentication Request
· generate RES(i) = [RAND(i), AUTN(i)]
f2(RAND(i),K) Authentication Response User Authentication:
· AUTN(i) for [RES(i)] Compare
Network Authentication XRES(i) & RES(i)
RES: Response
Fig. 13
TM2201EU04TM_0002
27
© 2002 Siemens AG
Siemens Security Features
28 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
AV Generation
AuC
Database
SQN Generator (IMSI;K) RAND Generator
AMF
Authentication &
SQN key Management K RAND
Sequence Number Field secret Key Random Number
f1 f2 f3 f4 f5
MAC XRES CK IK AK
Message Authentication Expected Response
Code Cipher Key Integrity Key Anonymity Key
® User
® Network Authentication ® Ciphering ® Ciphering ® SQN Anonymity
Authentication
AV = RAND
Random number
XRES
Expected Response
CK
Cipher Key
IK
Integrity Key
AUTN
Authentication Token
AMF
® selection of f1-5 version SQN Å AK AMF MAC
® different f1-5 versions possible 48 bit 16 bit 64 bit
(operator-dependent)
Fig. 14
TM2201EU04TM_0002
29
© 2002 Siemens AG
Siemens Security Features
30 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
f5 AK Å
SQN
f4 f3 f2 f1
IK CK RES XMAC
Fig. 15
TM2201EU04TM_0002
31
© 2002 Siemens AG
Siemens Security Features
Synchronization Failure
At the beginning of the Authentication process, the AuC generates the Sequence
Number SQN. SQN shall have a length of 48 bit. The structure & content of SQN is
operator-dependent. SQN may contain information used to restrict the Authentication
Vector AV validity time or to verify the Serving Network SN Identity.
SQN, being a part of AUTN, is transmitted via VLR/SGSN (“Authentication Data
Response”) to the USIM (“Authentication Request”).
The USIM regenerates SQN and verifies that the received SQN is in the correct
range.
If the USIM considers SQN to be not in the correct range, it sends the
“Synchronization Failure” message back to the VLR/SGSN including the appropriate
parameter, and abandons the connection set-up.
Upon receiving a “Synchronization Failure” message from the UE, the VLR/SGSN
sends an “Authentication Data Request” with a Synchronization Failure Indication to
the AuC of the user’s Home Environment HE together with RAND and the
appropriate parameter received from the UE.
The AuC checks the parameter, generates a fresh set of AVs and sends them with
an “Authentication Data Response” message to the VLR/SGSN.
Whenever the VLR/SGSN receives a new set of AVs from the AuC in an
“Authentication Data Response” to an “Authentication Data Request” with
Synchronization Failure Indication it deletes the old AVs for that UE. The VLR/SGSN
may now start a new authentication process to the UE based on a new AV from the
AuC.
32 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
• Re-generates SQN
• SQN in correct range ? AuC
No Þ Synchronisation Failure Authentication
Yes Þ continue Data Request [IMSI]
Authentication
Authentication Data HLR
Response [AV(1..n)]
USIM ] ]
e st tion ..n)
qu dic V(1
a
VLR / SGSN Re e In e [A
ta r s
. DaFailu pon
Authentication Request th n. es
[RAND(i), AUTN(i)] Au hro a R
c t
yn Da
Synchronisation Failure [S th.
Au
&
or Authentication Response
[RES(i)]
Network
Fig. 16
TM2201EU04TM_0002
33
© 2002 Siemens AG
Siemens Security Features
34 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
VLR / AuC
S-RNC SGSN HLR
SN
Serving HE
Network Home
UE Environment
Data Integrity Check Mandatory!!
provides security against
Mandatory!!
unauthorised modification of
• signalling data /
• change of data origin
Fig. 17
TM2201EU04TM_0002
35
© 2002 Siemens AG
Siemens Security Features
Connection Establishment
At the connection start the RRC Connection Establishment also informs the network
about the UEs security capabilities. They include the MEs UMTS Encryption
Algorithms UEAs and UMTS Integrity Algorithms UIAs. In Rel. ’99 only 2 UEAs and 1
UIA are defined (TS 33.102): UEA0 = “no encryption”, UEA1 = Kasumi encryption,
UIA1 = Kasumi algorithm. The S-RNC stores the UEs security capabilities.
36 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
•
Authentication Request Authentication Request
[RAND, AUTN] [RAND, AUTN] Authentication
generates:
RES, XMAC, Authentication Response Authentication Response & Key
CK, IK [RES] [RES] Generation
••
•
Security Mode Command Security
[ IK, CK, UIAs, UEAs]
Mode
Security Mode Command • Select UIA & UEA Set-Up
[UIA, UEA*, CN domain, • start Integrity
start Integrity Parameter, Cipher Start]
Integrity
Security Mode Complete Security Mode Complete
start (De-)Ciphering start (De-)Ciphering
S- VLR
UE *1 also denoted by f9
RNC SGSN
*2 also denoted by f8
Fig. 18
TM2201EU04TM_0002
37
© 2002 Siemens AG
Siemens Security Features
38 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Control Data:
· start of Integrity protection mandatory
S-
UE · nearly all control data Integrity protected* RNC
*not in case of
emergency calls
Transmitter Receiver
Encrypted Encrypted
Control Data Control
Control
Data Data
check sum check sum
check sum
IK dependent generator IK
check sum generator IK
Expected
Equal? Encrypted
check sum check sum
* exceptions listed in TS33.102 (6.5.1)
Fig. 19
TM2201EU04TM_0002
39
© 2002 Siemens AG
Siemens Security Features
40 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
f9 (UIA)
Control Data f9 (UIA)
Fig. 20
TM2201EU04TM_0002
41
© 2002 Siemens AG
Siemens Security Features
42 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Ciphering
UMTS Encryption Algorithm UEA not in case of
emergency calls
UE S-
RNC
UL = 0 1 Bearer parameter /
Cipher
Sequence No.
DL = 1
UE or S-RNC user radio bearer indicate length
of required
Direction Bearer Length keystream block
COUNT-C direction bit radio bearer id. length indicator
CKPS & CKCS
CK f8 (UEA)
Cipher Key
“cipher sequence”
Keystream block
Fig. 21
TM2201EU04TM_0002
43
© 2002 Siemens AG
Siemens Security Features
IMEI Check:
To prevent the usage of stolen or not allowed mobile equipment, the mobile
equipment identification can be checked by the network. This feature remains the
same as in GSM.
Authentication:
In UMTS authentication is extended compared to GSM. Additionally to the User
Authentication a Network Authentication is introduced.
User Authentication is the property that the Serving Network SN checks the real
identity of the user, preventing non-authorized access to the network.
Network Authentication is a check whether the connected SN is really authorized
by the user’s Home PLMN to provide him services. This includes the guarantee that
this authorization is recent.
Ciphering
Ciphering prevents eavesdropping of user data and signaling over the radio interface.
UMTS ciphering has been enhanced compared to GSM/GPRS.
44 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
UE S- VLR
RNC Summary SGSN
Fig. 22
TM2201EU04TM_0002
45
© 2002 Siemens AG
Siemens Security Features
46 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
6 Exercise
TM2201EU04TM_0002
47
© 2002 Siemens AG
Siemens Security Features
48 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Exercise
Title: UMTS Security Features
Objectives: The participant will be able to understand the basic security
features of UMTS
Pre-requisite: none
Task
TM2201EU04TM_0002
49
© 2002 Siemens AG
Siemens Security Features
5. Which of the following security parameter does the UMTS Authentication Vector
AV incorporate:
¨ Random Number RAND
¨ Sequence Number SQN
¨ Expected Response XRES
¨ Response RES
¨ Message Authentication Code MAC
¨ Expected Message Authentication Code XMAC
¨ Cipher Key CK
¨ Integrity Key IK
¨ Authentication Token AUTN
50 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
TM2201EU04TM_0002
51
© 2002 Siemens AG
Siemens Security Features
52 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
7 Solution
TM2201EU04TM_0002
53
© 2002 Siemens AG
Siemens Security Features
54 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
Solution
Title:
Objectives:
Pre-requisite:
Task
TM2201EU04TM_0002
55
© 2002 Siemens AG
Siemens Security Features
5. Which of the following security parameters does the UMTS Authentication Vector
AV incorporate:
þ Random Number RAND
þ Sequence Number SQN
þ Expected Response XRES
¨ Response RES
þ Message Authentication Code MAC
¨ Expected Message Authentication Code XMAC
þ Cipher Key CK
þ Integrity Key IK
þ Authentication Token AUTN
56 TM2201EU04TM_0002
© 2002 Siemens AG
Security Features Siemens
TM2201EU04TM_0002
57
© 2002 Siemens AG
Siemens Security Features
58 TM2201EU04TM_0002
© 2002 Siemens AG