Professional Documents
Culture Documents
GSM Security
GSM Security
Agenda
Introduction
GSM Overview
GSM Security Principles
Weakness of GSM
Solutions for Weakness
Introduction
Billions of user
Most of computer users know basic new value
Motorola.
1978 - First cellular network was setup in Bahrain
1982 - The European Conference of Post and
Telecommunications Administrations (CEPT) formed a group
called Group Spciale Mobile (GSM) to develop a European
cellular system that would replace the many existing
incompatible cellular systems already in place in Europe.
1987 A milestone was achieved with the signing of the
GSM Memorandum of Understanding (MoU) by operators,
agreeing to implement cellular networks, based on the GSM
specifications. While it was clear from the start that GSM
would be a digital system, it was officially announced in
1987.
1991 - GSM service started. In the same year, GSM was
renamed to Global System for Mobile Communications from
Group Spciale Mobile.
worldwide
Superior speech quality - better than existing analog
cellular technology
Short Message Service (SMS)
Packet Radio Service (GPRS)
Digital compatibility - easily interfaces with existing
digital networks like Integrated with Services Digital
Network (ISDN)
communication
Shouldnt increase the bit error rate
Shouldnt bring expensive complexity to the system
Should be useful and cost efficient
Should be able to detect suspicious mobile equipment
GSM Security
4Mechanisms
Main Security Mechanisms;
network
Ciphering of the data and signaling;
signaling and user data protection
Confidentiality of a user identity; using
TMSI instead of IMSI
Using SIM as security module; PIN code, it
contains IMSI, Ki, A3 and A8 algorithms
LFSR STRUCTURE
0
18 17 16
01
1
0111
00
11
01
00
11
00
11
01
00
11
00
11
00
1 10
C1
21 20
11
R1
10
clock
control
10
0
1111
0 0 01 10 00 01 10 011001100111111000011
R2
C2
1
0
22 21 20
0
11
00
11
00
11
0 01 0 10 1 01 10 11 11 01 10 11 01 00 10 01 1001
C3
R3
A5/1 : Operation
All 3 registers are zeroed
64 cycles (without the stop/go clock) :
Each bit of Kc (lsb to msb) is XOR'ed in parallel
GPRS Security
The
Weakness of GSM
Operators use COMP128 function without even
changing it.
The bit size of the algorithms is weak. A5/1
algorithm uses 64 bit Kc in the best case.
(COMP128, 54 bit Kc)
Authentication only exists BTS-MS
communication. No authentication for MS-BTS
Caller ID or Sender ID verification, data and
IDs are transmitted in different channels
IMSI is sent as plain text in the first
communication
History of Craching
Algorithms
1991: GSM implementation.
April 1998: The Smartcard Developer Association (SDA)
PC within seconds.
Side Channels
Thank You !