GSM Attack
GSM Attack
GSM Attack
Contents
Introduction to mobile telecommunications Second generation systems - GSM security Third generation systems - UMTS security
Interconnect
Visited network
Location Management
The network must know a mobiles location so that incoming calls can be routed to the correct destination When a mobile is switched on, it registers its current location in a Home Location Register (HLR) operated by the mobiles home operator A mobile is always roaming, either in the home operators own network or in another network where a roaming agreement exists with the home operator When a mobile registers in a network, information is retrieved from the HLR and stored in a Visitor Location Register (VLR) associated with the local switching centre
Location Management
VLR Roaming Radio base station Switching and routing Home network HLR
Interconnect
Eavesdropping
all you have to do is tune a radio receiver until you can hear someone talking
UMTS is the one that belongs to the GSM family UMTS uses a radio technology called Wideband Code Division Multiple Access (W-CDMA) which is connected to an evolution of the GSM/GPRS core network UMTS statistics
over 40 million subscribers at end September 2005 70 networks at end of 2004
source: GSM Association
Confidentiality
protects voice, data and sensitive signalling information (e.g. dialled digits) against eavesdropping on the radio path
Anonymity
protects against someone tracking the location of the user or identifying calls made to or from the user by eavesdropping on the radio path
Confidentiality
encryption of the radio channel
Anonymity
use of temporary identities
SIM
Authentication can be performed at call establishment allowing a new Kc to be used for each call
GSM Authentication
(1) Distribution of authentication data (2) Authentication
MSC HLR AuC
XRES Kc
RAND
RES Kc
RES
RES = XRES?
Located in the customers SIM and in the home networks AuC Standardisation of A3/A8 not required and each operator can choose their own
GSM Encryption
Different mechanisms for GSM (circuit-switched services) and GPRS (packet-switched services)
Encryption Mechanism
Encryption is performed by applying a stream cipher called A5 to the GSM TDMA frames, the choice being influenced by
speech coder error propagation delay handover
N-1 4 1
Frame N 2 User 2 3 4 1
Encryption Function
For each TDMA frame, A5 generates consecutive sequences of 114 bits for encrypting/decrypting in the transmit/receive time slots
encryption and decryption is performed by applying the 114 bit keystream sequences to the contents of each frame using a bitwise XOR operation
A5 generates the keystream as a function of the cipher key and the frame number - so the cipher is re-synchronised to every frame The TDMA frame number repeats after about 3.5 hours, hence the keystream starts to repeat after 3.5 hours
new cipher keys can be established to avoid keystream repeat
Full length 64 bit key now possible The strength also depends on which A5 algorithm is used
GPRS Encryption
Differences compared with GSM circuit-switched
Encryption terminated further back in network at SGSN Encryption applied at higher layer in protocol stack
Logical Link Layer (LLC)
GEA generates the keystream as a function of the cipher key and the LLC frame number - so the cipher is re-synchronised to every LLC frame LLC frame number is very large so keystream repeat is not an issue
IMSI: International Mobile Subscriber Identity TMSI: Temporary Mobile Subscriber Identity
(3a) Kc
Home Network
Some of the concerns were well founded, others were grossly exaggerated Significance of academic breakthroughs on cryptographic algorithms is often wildly overplayed
A5/2 now offers virtually no protection against passive eavesdropping A5/2 is now so weak that the cipher key can be discovered in near real time using a very small amount of known plaintext
relay authentication messages, then force mobile to encrypt with A5/2 to discover cipher key using Barkan, Biham and Keller attack, then drop target and hijack the channel
solution: remove A5/2 from new phones
Correct the problems with GSM by addressing security weaknesses Add new security features
to secure new services offered by UMTS to address changes in network architecture
Integrity protection of critical signalling between mobile and radio network controller
provides enhanced protection against false base station attacks by allowing the mobile to check the authenticity of certain signalling messages extends the influence of user authentication when encryption is not applied by allowing the network to check the authenticity of certain signalling messages
AuC has a random number generator AuC has a sequence number generator USIM has a scheme to verify freshness of received sequence numbers
UMTS Authentication
USIM MSC or SGSN
Authentication Data Request RAND,SQNAK || AMF||MAC
Decrypt SQN using f5 Verify MAC using f1 Check SQN freshness
f2-f4
HLR/AuC
AMF SQN RAND
f1-f5
RAND
RES
RES = XRES?
RES, CK, IK
Stream cipher used, UMTS Encryption Algorithm (UEA) UEA generates the keystream as a function of the cipher key, the bearer identity, the direction of the transmission and the frame number - so the cipher is re-synchronised to every MAC/RLC frame The frame number is very large so keystream repeat is not an issue
Helps extend the influence of authentication when encryption is not applied Uses the 128-bit integrity key (IK) derived during authentication Integrity applied at the Radio Resource Control (RRC) layer of the UMTS radio protocol stack
signalling traffic only
Open design and evaluation by ETSI SAGE Open publication of specifications and evaluation reports A second set of encryption/integrity algorithms (UEA2 and UIA2) are currently being designed
To be deployed as a back-up in case the Kasumi-based algorithms become compromised in the future
No export restrictions on terminals, and network equipment exportable under licence in accordance with international regulations
ETSI SAGE is also the design authority for UEA2 and UIA2
USIM
ME
BTS
RNC
User Equipment
Visited Network
Further Reading
3GPP standards, http://www.3gpp.org/ftp/specs/latest
TS 43.020 for GSM security features TS 33.102 for UMTS security features