8.3 Enhancements in UMTS

The 3GPP security tries to reuse the 2G security principles. The SIM is substituted by a USIM, encryption still concentrates on the radio interface, and the user identity is protected. But it also aims to overcome the weaknesses of 2G: the network is not authenticated, data integrity is not provided, the encryption is weak, and keys may be reused.

Security mechanisms in UMTS are published and not kept secret. The encryption with a 64 bits Kc in GSM was not sufficient. Also the operator in GSM can set the intervals between consecutive authentication procedures. In UMTS this is overcome: First an authentication token AUTN is introduced being a sequence number with which the actuality of the authentication vector can be proved. That prevents usage of older, probably stolen vectors. AUTN is also used to authenticate the network so that a mutual authentication of network and SIM takes place.
UMTS also has two separate keys, CK (similar to Kc in GSM) for encryption and IK for integrity protection. Both keys have 128 bits and are much longer than the GSM key.
There are UE, Node B, MSC/SGSN, and AuC on top. UE and AuC have Ki attached. 1. The MSC/SGSN sends Request Authentication Vector to the AuC. There is a block indicating that the AuC produces RANDU, RESU, CK, IK and AUTN. The latter three given in green throughout the diagram. 2. Thereafter the AuC sends Authentication Vector to MSC/SGSN. The block is now shown at the MSC/SGSN. 3. The MSC/SGSN sends RANDU and AUTN to the UE. The UE first checks AUTN. A block indicates that the MS then calculates RESU, CK and IK. 4. The UE sends RESU to the MSC/SGSN, which checks it. If the check is successful  5. The MSC/SGSN sends CK and IK to the NodeB.
Figure 8-4: Authentication before encryption in UMTS, green: changes compared to GSM.

The frequency of authentication in addition depends on the number of packets encrypted with the same key. The operator cannot set a longer interval between consecutive authentication. The AUTN check consists decrypting the included message authentication code and verifying the AUTN freshness. If the check is passed RES is calculated in parallel to CK and IK. The authentication is similar to that in GSM, but in UMTS it is mutual. The MS checks the AUTN and with this information it can authenticate the network. Then the MS is authenticated by the network as in GSM.

During handover using a GSM-MSC the keys are converted for compatibility reasons. This weakens them. The conversion formulas are:
\( CK=c4(K_c)=K_c||K_c \)     (8-1)
\( IK=c5(K_c)=K_c \,1 \oplus K_c\,2||K_c||K_c \,1 \oplus K_c\,2 \)     (8-2)
\( K_c=c3(CK,IK)=CK\,1 \oplus CK\,2 \oplus IK\, \oplus IK\,2 \).     (8-3)


Ha alcanzado el 0% de esta lección
0%