gsm security n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
GSM Security PowerPoint Presentation
Download Presentation
GSM Security

Loading in 2 Seconds...

play fullscreen
1 / 10

GSM Security - PowerPoint PPT Presentation


  • 112 Views
  • Uploaded on

GSM Security. GSM Security Provisions. Anonymity Authentication Signaling protection User data protection. Anonymity. Use of temporary Ids Use IMSI for initial authentication VLR generates a TMSI for the user Use the K c to encrypt TMSI. Authentication. GSM Triplets.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

GSM Security


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
gsm security

GSM Security

CSE 5349/7349

gsm security provisions
GSM Security Provisions
  • Anonymity
  • Authentication
  • Signaling protection
  • User data protection

CSE 5349/7349

anonymity
Anonymity
  • Use of temporary Ids
  • Use IMSI for initial authentication
  • VLR generates a TMSI for the user
  • Use the Kc to encrypt TMSI

CSE 5349/7349

authentication
Authentication

CSE 5349/7349

gsm triplets
GSM Triplets
  • Authentication while roaming
    • Without passing the Ki
  • AuC generates (Rand, XRES, Kc) triplets
  • Passes to VLR

CSE 5349/7349

triplets cont d
Triplets (cont’d)

CSE 5349/7349

attacks on gsm security
Attacks on GSM Security
  • Microwave links
  • SIM/ME interface
  • Attacks on A3/8, A5/1
    • Through air interface
    • With possession of ME
  • Attacks on SIM card
    • Optical fault induction
    • Partitioning attacks (IBM)
      • Ki can be extracted with <1000 tries

CSE 5349/7349

attacks cont d
Attacks (cont’d)
  • False base station
    • GSM does unilateral authentication
  • DoS
    • Jamming the signal
    • Preventing the MS from communicating

CSE 5349/7349

slide9
3GPP
  • Built on GSM
  • Two way authentication
  • Better algorithms
    • KASUMI
  • Protection of network signaling

CSE 5349/7349

grps security
GRPS Security

CSE 5349/7349