null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
59651
Crypto U12 (part 1), crypto for mobile telecom
Descrição
IYM002 (Unit 12 - Crypto Systems) Mapa Mental sobre Crypto U12 (part 1), crypto for mobile telecom, criado por jjanesko em 28-04-2013.
Sem etiquetas
iym002
unit 12 - crypto systems
iym002
unit 12 - crypto systems
Mapa Mental por
jjanesko
, atualizado more than 1 year ago
Mais
Menos
Criado por
jjanesko
mais de 11 anos atrás
105
10
0
Resumo de Recurso
Crypto U12 (part 1), crypto for mobile telecom
background
mobile telecom companies share operational standards
original mobile systems not secure
sent serial numbers in the clear
eavesdropping easy
cloning possible
GSM
designed by ETSI
European Telecommunications Standards Institute
improved security over original
UTMS
next step in evolution after GSM
cellular network diagram
Anotações:
http://en.wikipedia.org/wiki/Zero-knowledge_proof#Abstract_example
general design
main motivation for security: revenue protection
must be cost effective
should be as secure as the public switched telephone network and not more
adapts to evolving constraints
shifted from proprietary algorithms (GSM) to publicly known ones (UTM)
must handle noisy comm channel
UTMS
new features
mutual entity authentication
supported by AKE (similar to GSM except additonal MAC key is generated)
sequence # added for freshness and maintained by mobile device and base station
prevention of AKE triplet replay
sequence #'s prevent replay
roaming authentication upgraded to have quintlets
longer key lengths
publicly know algorithms
integrity of signalling data with a MAC
GSM
security requirements
entity authentication of the user
confidentiality on radio path
anonymity on radio path
prevents an attacker form linking the source of several calls
constraints
not excessively strong
export!
do not add to much overhead
especially on call setup
design
fully symmetric architecture
GSM closed system
fast
stream cipher
noisy comm channel
fixed encryption algorithms
proprietary algorithms
closed system
ETSI has crypto expertise
performance
crypto components
subscriber identification module (SIM)
has international mobile subscriber identity
maps user to phone
has unique 128 bit crypto key used for all crypto services
AKE (authentication and key establishment)
uses dynamic password scheme
protocols
A3
challenge response protocol
A8
generate encryption key
not shared with other access providers
special roaming scheme
comm encryption
service shared with other mobile networks
Uses standard A5/1
64 bit key, stream cipher
security analysis
popular implementation of A3 and A8 was COMP 128
designs leadked and weaknesses found
A5/1 reverse engineered
powerful attacks developed
effective because it addressed cloning and eavesdropping
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Crypto U12, SSL
jjanesko
Crypto U12, WLAN
jjanesko
Crypto U12 (part 2), crypto for mobile telecom
jjanesko
Crypto U12 GSM,UTMS Hierarchy Diagram
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Explore a Biblioteca