Crypto U12 (part 1), crypto for mobile telecom

Descripción

(Unit 12 - Crypto Systems) IYM002 Mapa Mental sobre Crypto U12 (part 1), crypto for mobile telecom, creado por jjanesko el 28/04/2013.
jjanesko
Mapa Mental por jjanesko, actualizado hace más de 1 año
jjanesko
Creado por jjanesko hace alrededor de 11 años
103
10

Resumen del Recurso

Crypto U12 (part 1), crypto for mobile telecom
  1. background
    1. mobile telecom companies share operational standards
      1. original mobile systems not secure
        1. sent serial numbers in the clear
          1. eavesdropping easy
            1. cloning possible
            2. GSM
              1. designed by ETSI
                1. European Telecommunications Standards Institute
                2. improved security over original
                3. UTMS
                  1. next step in evolution after GSM
                  2. cellular network diagram

                    Nota:

                    • http://en.wikipedia.org/wiki/Zero-knowledge_proof#Abstract_example
                  3. general design
                    1. main motivation for security: revenue protection
                      1. must be cost effective
                        1. should be as secure as the public switched telephone network and not more
                          1. adapts to evolving constraints
                            1. shifted from proprietary algorithms (GSM) to publicly known ones (UTM)
                              1. must handle noisy comm channel
                              2. UTMS
                                1. new features
                                  1. mutual entity authentication
                                    1. supported by AKE (similar to GSM except additonal MAC key is generated)
                                      1. sequence # added for freshness and maintained by mobile device and base station
                                      2. prevention of AKE triplet replay
                                        1. sequence #'s prevent replay
                                          1. roaming authentication upgraded to have quintlets
                                          2. longer key lengths
                                            1. publicly know algorithms
                                              1. integrity of signalling data with a MAC
                                            2. GSM
                                              1. security requirements
                                                1. entity authentication of the user
                                                  1. confidentiality on radio path
                                                    1. anonymity on radio path
                                                      1. prevents an attacker form linking the source of several calls
                                                      2. constraints
                                                        1. not excessively strong
                                                          1. export!
                                                          2. do not add to much overhead
                                                            1. especially on call setup
                                                        2. design
                                                          1. fully symmetric architecture
                                                            1. GSM closed system
                                                              1. fast
                                                              2. stream cipher
                                                                1. noisy comm channel
                                                                2. fixed encryption algorithms
                                                                  1. proprietary algorithms
                                                                    1. closed system
                                                                      1. ETSI has crypto expertise
                                                                        1. performance
                                                                      2. crypto components
                                                                        1. subscriber identification module (SIM)
                                                                          1. has international mobile subscriber identity
                                                                            1. maps user to phone
                                                                            2. has unique 128 bit crypto key used for all crypto services
                                                                            3. AKE (authentication and key establishment)
                                                                              1. uses dynamic password scheme
                                                                                1. protocols
                                                                                  1. A3
                                                                                    1. challenge response protocol
                                                                                    2. A8
                                                                                      1. generate encryption key
                                                                                    3. not shared with other access providers
                                                                                      1. special roaming scheme
                                                                                      2. comm encryption
                                                                                        1. service shared with other mobile networks
                                                                                          1. Uses standard A5/1
                                                                                            1. 64 bit key, stream cipher
                                                                                        2. security analysis
                                                                                          1. popular implementation of A3 and A8 was COMP 128
                                                                                            1. designs leadked and weaknesses found
                                                                                            2. A5/1 reverse engineered
                                                                                              1. powerful attacks developed
                                                                                              2. effective because it addressed cloning and eavesdropping
                                                                                            Mostrar resumen completo Ocultar resumen completo

                                                                                            Similar

                                                                                            Crypto U12 (part 2), crypto for mobile telecom
                                                                                            jjanesko
                                                                                            Crypto U12, WLAN
                                                                                            jjanesko
                                                                                            Crypto U12, SSL
                                                                                            jjanesko
                                                                                            Crypto U12 GSM,UTMS Hierarchy Diagram
                                                                                            jjanesko
                                                                                            Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                                            jjanesko
                                                                                            Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                                            jjanesko
                                                                                            Crypto U3, Theoretical vs. Practical Security
                                                                                            jjanesko
                                                                                            Crypto U1, Basic Principles
                                                                                            jjanesko
                                                                                            Crypto U4, Stream Cipher
                                                                                            jjanesko
                                                                                            Crypto U4, Block Cipher, Counter Mode
                                                                                            jjanesko
                                                                                            Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                                            jjanesko