Professional Documents
Culture Documents
net/publication/290750579
CITATIONS READS
2 1,043
4 authors, including:
Bentaleb Youssef
Ecole nationale des sciences appliquées de Kénitra
15 PUBLICATIONS 120 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Jalal Laassiri on 19 January 2016.
www.jatit.org
ABSTRACT
In the present paper, we are interested in Universal Mobile Telecommunications System (UMTS) Access
Network security. A special interest is given to the protection of the data integrity and the provisioning of
data encryption. Indeed, the appropriate procedures and cryptographic algorithms are discussed. In previous
work, we were interested in the study of the operation and complexity of the algorithms, but actually we
will focus on other aspects. A closer look is taken at the two sets of UMTS cryptographic algorithms:
UEA1/UIA1 (UEA indicates UMTS Encryption Algorithm and UIA UMTS Integrity Algorithm) based on
the KASUMI algorithm and UEA2/UIA2 based on the SNOW 3G algorithm. Furthermore, this paper
includes the results of the verification and the implementation of the two sets of the UMTS cryptographic
algorithms. The necessary corrections and/or adaptation of the 3GPP algorithms codes having carried out
to meet the 3GPP algorithms specifications. Furthermore, we propose an adaptation of the second set of
algorithms to the little-endian machines since the 3GPP proposed codes are only limited to the big-endian
machines. These corrections and adaptations are presented in the present paper and some implementation
examples are presented as well.
Keywords: UMTS, Confidentiality, Integrity, SNOW 3G, Verification, Implementation
67
Journal of Theoretical and Applied Information Technology
www.jatit.org
Integrity key (IK) agreement; The second one, UEA2, is also a stream cipher
but based on another stream cipher named SNOW
Data integrity and origin authentication of 3G. It was introduced as 3GPP standard on 2006.
signaling data: the receiving entity (MS or SN)
must be able to check that the signaling data 1.3. UMTS Integrity Function f9
wasn't modified during its transition over the To ensure signaling data protection, a message
network access link and to check the expected authentication function f9 shall be applied to these
origin of the message (SN or MS). information elements transmitted between the ME
(Mobile Equipment) and the RNC (Radio Network
In the following subsections, we will introduce
the UMTS confidentiality and integrity Controller). It's a one-way function which generates
mechanisms. a 32-bit output MAC-I under the control of 128-bit
Integrity Key IK [2, 3, 11].
1.2. UMTS Encryption Function f8
“Figure 2” bellow illustrates the calculation
The need for a confidentiality protected mode of mechanism of the message authentication code
transmission is fulfilled by an UMTS MAC-I using the f9 function.
confidentiality cryptographic function f8 [1, 2, 3]
which is a symmetric synchronous stream cipher.
This type of ciphering has the advantage to generate
the mask of data before even receiving the data to
encrypt, which help to save time. Furthermore, it is
based on bitwise operations which are carried out
quickly.
“Figure 1” bellow illustrates the Encryption/
Decryption operations using the f8 function.
Figure 2. Derivation of MAC-I (or XMAC-I) [1, 2]
The algorithm input parameters are the
following:
IK: Integrity Key;
COUNT-I: Frame dependent input;
FRESH: Random number generated by the
network;
DIRECTION: Direction of the transmission;
Figure 1. Encryption/Decryption mechanism MESSAGE: Input bit stream;
The input parameters of f8 are the following: Based on these input parameters, the message
CK : Cipher Key; authentication code MAC-I is calculated.
68
Journal of Theoretical and Applied Information Technology
www.jatit.org
69
Journal of Theoretical and Applied Information Technology
www.jatit.org
70
Journal of Theoretical and Applied Information Technology
www.jatit.org
71
Journal of Theoretical and Applied Information Technology
www.jatit.org
72
Journal of Theoretical and Applied Information Technology
www.jatit.org
73
Journal of Theoretical and Applied Information Technology
www.jatit.org
74
Journal of Theoretical and Applied Information Technology
www.jatit.org
2827B599B6B1BBDA37A8ABCC5A8C550D 4. CONCLUSION
In this paper, a detailed study of the UMTS
1BFB2F494624FB50367FA36CE3BC68F1
cryptographic functions f8 and f9 has been carried
1CF93B1510376B02130F812A9FA169D8 out. The first objective was to make it easy to
understand each UMTS confidentiality or integrity
algorithms operation. On the other hand, we were
interested in the verification of the 3GPP algorithms
codes given by 3GPP specification. Our verification
leads to the result that the algorithm codes were
incorrect (except for UIA1) and didn't respond
totally to the 3GPP requirements. So some
rectifications and adaptations were necessary before
proceeding to the algorithms implementation.
As far as the confidentiality algorithm UEA1 and
UEA2 are concerned, the ciphertext length control
have been omitted. So we have carried out the
necessary correction. Concerning the UEA2 and
Figure 10. Encryption with UEA2 rectified version UIA2 algorithms implementation, we were faced to
the code compatibility problem with little endian-
3.4. UIA2 implementation example machines in both algorithms. So, we have corrected
the 3GPP algorithms codes version and recoded
After carrying out the necessary corrections and
them with respect to endian issues. Thus, the
adaptations for the UIA2 algorithms, we present
practical aspect of our present work was the
bellow an example of one of the testsets
verification, the rectification and finally the
implemented.
implementation of the UTRAN cryptographic
Input Data: algorithms in C language. Some results of the
implementation tests were exposed. Through this
COUNT-I = 14793E41 FRESH = 0397E8FD
paper, we are proposing a correct codes version of
DIRECTION = 1 LENGTH = 384 bits the UMTS confidentiality and integrity algorithms
to contribute and facilitate their use and integration
IK = C736C6AAB22BFFF91E2698D2E22AD57E
by the interested entities.
MESSAGE:
D0A7D463DF9FB2B278833FA02E235AA1
REFRENCES:
72BD970C1473E12907FB648B6599AAA0
B24A038665422B20A499276A50427009 [1] 3GPP Specifications: http://www.3gpp.org
75
Journal of Theoretical and Applied Information Technology
www.jatit.org
[5] 3GPP TS35.201: “3rd Generation Partnership Algorithms; Document 4: Design Conformance
Project; Technical Specification Group Services Test Data (Release 7)”. June 2007.
and System Aspects; 3G Security; Specification [15] G. Orhanou, S. El Hajji, Université Mohammed
of the 3GPP Confidentiality and Integrity V – Agdal, Faculté des sciences – Rabat,
Algorithms; Document 1: f8 and f9 Laboratoire Mathématiques Informatique et
Specification”. June 2007. Applications : “UTRAN Cryptrographic
Algorithms – Operation and complexity study”.
[6] 3GPP TS35.202: “3rd Generation Partnership Journal of Theoretical and Applied Information
Project; Technical Specification Group Services Technology, ISSN: 1817-3195, Volume 14,
and System Aspects; 3G Security; Specification n°2, 97 – 106, 2010.
of the 3GPP Confidentiality and Integrity
Algorithms; Document 2: KASUMI [16] ETSI/SAGE Specification: “Specification of
Specification”. june 2007. the 3GPP Confidentiality and Integrity
Algorithms UEA2 & UIA2 Document 3:
[7] ETSI/SAGE Specification: “Specification of the Implementors Test Data”. Version: 1.0, January
3GPP Confidentiality and Integrity Algorithms 2006.
UEA2 & UIA2. Document 1: UEA2 and UIA2
Specification”. Version: 1.1, September 2006.
76
V i e w p u b l i c a t i o n s t a t s