Gsm Security

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Gsm Security as PDF for free.

More details

  • Words: 338
  • Pages: 6
GSM Network Architecture  Which related to the security system Network and Switching Subsystem Permanen IMSI

HLR

BTS LAI

Ki

MSISDN

A5

Temporer MSRN SRES IMSI

AUC

VLR

ME

Mobile Station

SRES

IMSI

MSRN

TMSI

MSISDN

Kc RAND Ki

Kc

A3

RAND

A8

LAI

SIM

IMSI

Ki

A3

A8

A5

• • • • • • • • •

IMSI TMSI MSRN MSISDN LAI Ki Kc SRES RAND

: International Mobile Subscriber Identity : Temporary Mobile Subscriber Identity : Mobile Station Roaming Number : Mobile Station ISDN : Local Area Identity : authentication key : ciphering key : Signed Response : random number

GSM Security Algorithms Ki 128 bit

RAND 128 bit

• A3 : Subscriber authentication algorithm • A8 : Cipher key generation algorithm • A5 : Ciphering/deciphering algorithm

A3

SRES

A8

Kc

32 bit

TDMA frame number

64 bit

A5 S2

S1 downlink

Plain text 114 bit

Cipher text 114 bit uplink

GSM Security System Basic Services •

TMSI assignment



Authentication



Signaling and voice data confidentiality



SIM and ME identification

TMSI Assignment

IMSI

E(TMSI) A5

IMSI BTS

VLR TMSI



Objective : to protect the IMSI.



5 digit TMSI replace at each location update procedure.



TMSI sent encrypted by A5 algorithm from BTS to MS. Weaknesses:  No protection for IMSI which transmitted between MS and fixed network.  TMSI only encrypted between BTS and MS.

Authentication challenge RAND

RAND

Ki

SRESnetwork

A3

SRESMS MS

SRESMS

SRESMS = SRESnetwork ?

No Deny access

response Access granted

Yes Fixed network

• •

Objective : to know subscriber identity fidelity. Known as Challenge-Response method. Weaknesses:  No protection for RAND and SRESMS which transmitted.

Ciphering - Deciphering Kc

Nomor Frame

Kc

Nomor Frame

64 bit

22 bit

64 bit

22 bit

Codeword downlink 114 bit

Algoritma A5

Algoritma A5 S1

Plaintext 114 bit

Ciphertext

S2

Plaintext 114 bit

S2

114 bit BTS

• •

S1

Codeword uplink 114 bit

MS

Ciphering process are held on BTS and MS, using A5 algorithm. Symmetry cryptography.

Related Documents

Gsm Security
November 2019 7
Security In Gsm
June 2020 1
Security In Gsm
May 2020 4
Gsm Sim & Security
June 2020 11
Gsm
May 2020 43
Gsm
June 2020 41