null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
59651
Crypto U12 (part 1), crypto for mobile telecom
Descripción
(Unit 12 - Crypto Systems) IYM002 Mapa Mental sobre Crypto U12 (part 1), crypto for mobile telecom, creado por jjanesko el 28/04/2013.
Sin etiquetas
iym002
unit 12 - crypto systems
iym002
unit 12 - crypto systems
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 11 años
105
10
0
Resumen del Recurso
Crypto U12 (part 1), crypto for mobile telecom
background
mobile telecom companies share operational standards
original mobile systems not secure
sent serial numbers in the clear
eavesdropping easy
cloning possible
GSM
designed by ETSI
European Telecommunications Standards Institute
improved security over original
UTMS
next step in evolution after GSM
cellular network diagram
Nota:
http://en.wikipedia.org/wiki/Zero-knowledge_proof#Abstract_example
general design
main motivation for security: revenue protection
must be cost effective
should be as secure as the public switched telephone network and not more
adapts to evolving constraints
shifted from proprietary algorithms (GSM) to publicly known ones (UTM)
must handle noisy comm channel
UTMS
new features
mutual entity authentication
supported by AKE (similar to GSM except additonal MAC key is generated)
sequence # added for freshness and maintained by mobile device and base station
prevention of AKE triplet replay
sequence #'s prevent replay
roaming authentication upgraded to have quintlets
longer key lengths
publicly know algorithms
integrity of signalling data with a MAC
GSM
security requirements
entity authentication of the user
confidentiality on radio path
anonymity on radio path
prevents an attacker form linking the source of several calls
constraints
not excessively strong
export!
do not add to much overhead
especially on call setup
design
fully symmetric architecture
GSM closed system
fast
stream cipher
noisy comm channel
fixed encryption algorithms
proprietary algorithms
closed system
ETSI has crypto expertise
performance
crypto components
subscriber identification module (SIM)
has international mobile subscriber identity
maps user to phone
has unique 128 bit crypto key used for all crypto services
AKE (authentication and key establishment)
uses dynamic password scheme
protocols
A3
challenge response protocol
A8
generate encryption key
not shared with other access providers
special roaming scheme
comm encryption
service shared with other mobile networks
Uses standard A5/1
64 bit key, stream cipher
security analysis
popular implementation of A3 and A8 was COMP 128
designs leadked and weaknesses found
A5/1 reverse engineered
powerful attacks developed
effective because it addressed cloning and eavesdropping
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Crypto U12, SSL
jjanesko
Crypto U12, WLAN
jjanesko
Crypto U12 (part 2), crypto for mobile telecom
jjanesko
Crypto U12 GSM,UTMS Hierarchy Diagram
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Explorar la Librería