GSM Security
GSM Security
Agenda
Introduction
GSM Overview
GSM Security Principles
Weakness of GSM
Solutions for Weakness
Introduction
Billions of user
Most of computer users know basic concepts, such
new value
as virus, antivirus, trojan…
But people do not even have any idea about GSM
security.
They blindly trust GSM
GSM Overview – GSM History
1876 - First telephone was invented by Alexander Bell.
1973 - First handheld cellular phone was released by Motorola.
1978 - First cellular network was setup in Bahrain
1982 - The European Conference of Post and
Telecommunications Administrations (CEPT) formed a group
called Group Spéciale Mobile (GSM) to develop a European
cellular system that would replace the many existing
incompatible cellular systems already in place in Europe.
1987 – A milestone was achieved with the signing of the GSM
Memorandum of Understanding (MoU) by operators, agreeing
to implement cellular networks, based on the GSM
specifications. While it was clear from the start that GSM
would be a digital system, it was officially announced in 1987.
1991 - GSM service started. In the same year, GSM was
renamed to Global System for Mobile Communications from
Group Spéciale Mobile.
GSM Overview – GSM Features
International Roaming - single subscriber number worldwide
Superior speech quality - better than existing analog cellular
technology
Short Message Service (SMS)
Packet Radio Service (GPRS)
Digital compatibility - easily interfaces with existing digital
networks like Integrated with Services Digital Network (ISDN)
GSM Overview – GSM Architecture
Cells and Cluster Structure
GSM Overview – GSM Architecture
Device Structure
GSM Overview – GSM Architecture
Device Structure – 2
Subscriber Identity Module (SIM) Card: It is operator dependent
smart card which contains A3/8 algorithms, IMSI and Ki.
Mobile Equipment (ME): It is operator independent
communication device. It contains A5 algorithm.
Base Transceiver Station (BTS): Base stations form a patchwork
of radio cells over a given geographic coverage area.
Base Station Controller (BSC)
It is a node controlling a number of BTS, coordinating
handovers and performing BS co-ordination not related to
switching.
GSM Overview – GSM Architecture
Device Structure – 3
Mobile Switching Center (MSC): It is a node controlling a number of
BSC. It is center device and has a lot of function in GSM system.
Home Location Register (HLR) : It is used for recording the most
recent known location of all MS belonging to MS’s home area. It
contains all administrative information about each registered
user
Visited Location Register (VLR): It is used for recording information
about all MS when they are at the “visiting” area.
Authentication Centre (AuC): It is used by a HLR to generate
random challenges (RAND) and to store secret key information
(Ki) relating to each of its MS.
Equipment Identity Register (EIR): Suspicious Devices; the white list,
the gray list, and the black list.
GSM Security – Goals & Concerns
design
GSM Security Algorithms
COMP128;
The COMP128 takes the RAND and the Ki as input
01
1 0111
0011
0100
1100
1101
0011
0011
001 10 R1
C1
10
clock
21 20 control
0
11 10
0 0 0 01 10 00 01 10 011001100111111000011
1111 R2
C2
1
22 21 20 0
0
1100
1100
110 01 0 10 1 01 10 11 11 01 10 11 01 00 10 01 1001 R3
C3
0
A5/1 : Operation
All 3 registers are zeroed
64 cycles (without the stop/go clock) :
Each bit of Kc (lsb to msb) is XOR'ed in parallel into the
lsb's of the registers
22 cycles (without the stop/go clock) :
Each bit of Fn (lsb to msb) is XOR'ed in parallel into the
lsb's of the registers
100 cycles with the stop/go clock control,
discarding the output
228 cycles with the stop/go clock control which
produce the output bit sequence.
GPRS Security
The same A3/8 algorithms are used with the same Ki,
different RAND
The resulting Kc is different than voice communication key
Brute-Force Attacks:
Kc is 64 bits although the last 10 bits are set to zero. It
reduces the key space from 2^64 to 2^54
A5/2 can be broken in real time with a work factor of
approximately 2^16
A5/1 can be break with a work factor of 2^40
A key space of 2^54 would thus require about 18
hours
Popular Attack Types – Attacks on the
Confidentiality of GSM
End-to-end Security