GSM System Security

26
 Security in the GSM system By Jeremy Quirke | Last updated 1 st May 2004 © 2004 AusMobile http://www.ausmobile.com SECURITY IN THE GSM SYSTEM ........................... .............. ................................................................ 1  INTRODUCTION ............................ .............. ............................ .............. .............. .............. ........................ 2  SECURITY FEATURES OFFERED BY GSM............................................ .............. ............................... 2  AUTHENTICATION ...................................................................................................................................... 3  The SIM card ...................................................................... .............. .............. .............. .............. .......... 3   Additional local security in the SIM...................................................................................................... 4  The A3 algorithm and authentication procedure ............................... .......... ........... ..................... ......... 4   Authentication failure ........................................................................................................................... 6   More on the A3 algorithm..................................................................................................................... 6  CIPHERING.................................................................................................................................................. 6  Ciphe ring algorithms............................................................ .............. .............. .............. ...................... 8  A  NONYMITY............................................................................................................................................... 8  DISTRIBUTION OF THE AUTHENTICATION AND CIPHERING INFORMATION THROUGHOUT THE NETWORK ... 10 IMPLEMENTATIONS OF A3, A8 ................................................................................................................. 11  FREQUENCY HOPPING ............................................................................................................................... 11  FLAWS WITH THESE MEASURES ............ .............. ............................ .............. ............................ ...... 13   NETWORK DOES NOT AUTHENTICATE ITSELF TO A PHONE ........................................................................ 13  COMMON IMPLEMENTATION OF A3/A8 IS FLAWED  CONTAINS A NARROW PIPE ...................................... 13  COMMON IMPLEMENTATION OF A3/A8 IS FLAWED  REDUCES STRENGTH OF CIPHERING KEY K C............ 14 VULNERABILITIES IN THE SUBSCRIBER IDENTITY CONFIDENTIALITY MECHANISM .................................... 14  OVER THE AIR CRACKING OF K I................................................................................................................ 15  CIPHERING OCCURS AFTER FEC ............................................................................................................... 17  FLAWS IN A5/1 AND A5/2 ALGORITHM..................................................................................................... 18  MEASURES TAKEN TO ADDRESS THESE FLAWS .............. .............. ............................ ............. .... 18  GSM -  NEWER A3/A8 IMPLEMENTATION................................................................................................. 18  GSM - A5/3 CIPHERING............................................................................................................................ 19  GPRS    GEA3 CIPHERING........................................................................................................................ 19  GPRS/UMTS    CIPHERING BEFORE FEC........................ ......................................................................... 19  UMTS     NETWORK AUTHENTICATION TO PHONE ..................................................................................... 19  UMTS    IMPROVED, STRONGER ALGORITHMS ......................................................................................... 20   Authentication and key generation...................................................................................................... 20  Ciphering and integrity....................................................................................................................... 21  CONCLUSION............................ .............. ............................ .............. ............................ .............. ............. 22  REFERENCES ............................ .............. ............................ .............. ............................ .............. ............. 23  APPENDIX A A5/1 IMPLEMENTATION........ .............. .............. ............................ .............. ............. 24  BASIC ALGORITHM ................................................................................................................................... 24  I  NITIAL STATE .......................................................................................................................................... 25  GENERATING CIPHER STREAM .................................................................................................................. 25  APPENDI X B – ALGORITHMS USED BY AUSTRALIAN OPERATORS...................... ................. 25  GSM/GPRS ............................................................................................................................................. 25  

Transcript of GSM System Security

Page 1: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 1/26

Page 2: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 2/26

Page 3: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 3/26

Page 4: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 4/26

Page 5: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 5/26

Page 6: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 6/26

Page 7: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 7/26

Page 8: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 8/26

Page 9: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 9/26

Page 10: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 10/26

Page 11: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 11/26

Page 12: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 12/26

Page 13: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 13/26

Page 14: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 14/26

Page 15: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 15/26

Page 16: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 16/26

Page 17: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 17/26

Page 18: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 18/26

Page 19: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 19/26

Page 20: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 20/26

Page 21: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 21/26

Page 22: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 22/26

Page 23: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 23/26

Page 24: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 24/26

Page 25: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 25/26

Page 26: GSM System Security

8/14/2019 GSM System Security

http://slidepdf.com/reader/full/gsm-system-security 26/26