17
© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN 1 Role of Crypto in Mobile Communications Valtteri Niemi ECRYPT workshop 27-29 May 2008 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN 2 Outline Some history about: Use of crypto in 1G, 2G, 3G mobile communications 3GPP security specifications SAE/LTE security Role of crypto in other 3GPP features Network domain security (NDS) IP Multimedia Subsystem (IMS) Interworking with WLAN (I-WLAN) Generic Authentication Architecture (GAA) Multimedia Broadcast/Multicast Service (MBMS) Secure channel between UICC and a (remote) terminal Lawful interception Summary

Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN1

Role of Crypto in Mobile CommunicationsValtteri NiemiECRYPT workshop 27-29 May 2008

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN2

Outline• Some history about:

• Use of crypto in 1G, 2G, 3G mobile communications• 3GPP security specifications

• SAE/LTE security• Role of crypto in other 3GPP features

• Network domain security (NDS)• IP Multimedia Subsystem (IMS)• Interworking with WLAN (I-WLAN)• Generic Authentication Architecture (GAA)• Multimedia Broadcast/Multicast Service (MBMS)• Secure channel between UICC and a (remote) terminal• Lawful interception

• Summary

Page 2: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN3

Essential crypto-features in 2G, 3G, SAE/LTE

Radio network control

Core network

GSM:Auth (1-way)

Ciph

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN4

Essential crypto-features in 2G, 3G, SAE/LTE

Radio network control

Core network

GSM:Auth (1-way)

Ciph

GPRS:Auth (1-way) + ciph

Page 3: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN5

Essential crypto-features in 2G, 3G, SAE/LTE

Radio networkcontrol

Core network

GSM:Auth (1-way)

Ciph

GPRS:Auth (1-way) + ciph

3G:Auth (2-way)

Ciph + integrity of signalling

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN6

Essential crypto-features in 2G, 3G, SAE/LTE

Radio network control

Core network

GSM:Auth (1-way)

Ciph

GPRS:Auth (1-way) + ciph

3G:Auth (2-way)

Ciph + integrity of signalling

SAE/LTE:Ciph + intg of radio signalling IPsec

Auth (2-way)

intg of core ntwk signalling

Page 4: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN7

Some history of 3GPP security 1/2• For 3GPP Release 99, WG SA3 created 14 new specifications, e.g.

TS 33.102 “3G security; Security architecture”• In addition 5 specifications originated by ETSI SAGE, e.g. TS 35.202

“KASUMI specification”

• For Release 4, SA3 was kept busy with GERAN security, MAP security (later to be replaced by TCAP security) and various extensions to Rel-99

• ETSI SAGE originated again 5 new specifications, e.g. TS 35.205-208 “MILENAGE algorithm set”

• 3GPP Release 5: SA3 added 3 new specifications, e.g.:• TS 33.203 “IMS security”• TS 33.210 “Network domain security: IP layer”

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN8

Some history of 3GPP security 2/2• Release 6: SA3 added 17 new specifications, e.g.:

• TS 33.310 “Network domain security: Authentication Framework”• TS 33.234 “I-WLAN security”• TS 33.220-222 “Generic Authentication Architecture” specs• TS 33.246 “MBMS security

• Release 7: SA3 added 8 new specifications, e.g:• TS 33.110 “Key establishment between a UICC and a terminal”• TS 33.259 “Key establishment between a UICC hosting device and a

remote device”• TS 33.204 “Network Domain Security; Transaction Capabilities

Application Part (TCAP) user security”• In addition, ETSI SAGE created 5 specifications for UEA2 & UIA2

(incl. SNOW 3G spec) (TS 35.215-218, TR 35.919)

• Release 8: Main addition is SAE/LTE security

Page 5: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN9

SAE/LTE: What and why?

SAE = System Architecture EvolutionLTE = Long Term Evolution (of radio networks)

• LTE offers higher data rates, up to 100 Mb/sec• Multi-antenna technologies• New transmission schema based on OFDM• Signaling/scheduling optimizations

• SAE offers optimized IP-based architecture• Packet-based• Flat architecture: 2 network nodes for user plane• Simplified protocol stack• Optimized inter-working with legacy cellular, incl. CDMA• Inter-working with non-3GPP accesses, incl. WiMAX

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN10

SAE: Non-Roaming Architecture for 3GPP Accesses (TS 23.401)

SGi

S12

S3S1-MME

PCRF

S7

S6a

HS

Operator ’ s IP Services (e.g. IMS, PSS etc.)

Rx+

S10

UE

UTRAN

GERAN SGSN

“ LTE - Uu ” E-UTRAN

MME

S11

S5Serving Gateway

PDN Gateway

S1-U

S4

E-UTRAN = Evolved UTRAN (LTE radio network)EPC = Evolved Packet Core (SAE core network)EPS = Evolved Packet System ( = RAN + EPC )

Page 6: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN11

LTE: E-UTRAN architecture (TS 36.300)

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN12

Implications on security

• Flat architecture user plane security terminates in eNodeB• Deeper key hierarchy• Implementation security for eNodeB

• Many different access technologies different kind of networks participate trust models more complex

• Extended key hierarchy• Weaknesses in one network not to affect others• Many inter-working cases to be covered

Page 7: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN13

Security functions• Authentication and key agreement

• UMTS AKA re-used for SAE• SIM access to LTE is explicitly excluded• On the other hand, Rel-99 USIM is sufficient

• Signalling protection• For core network (NAS) signalling, integrity and confidentiality protection terminate in

MME• For radio network (RRC) signalling, integrity and confidentiality protection terminate in

eNodeB

• User plane protection• Encryption terminates in eNodeB• Separate protection in network interfaces

• Network domain security used for network internal interfaces

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN14

SAE key hierarchy

USIM / AuC

UE / MME

UE / ASMEKASME

K

KUPenc

KeNBKNASint

UE / HSS

UE / eNB

KNASenc

CK, IK

KRRCint KRRCenc

Page 8: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN15

Key derivation and distribution, network side

HSS Ks

KDF

256

256

network-ID

MME KeNB

KASME

256

KDF

KD

F

KDF KDF

256-bit keys KNASenc KNASint

128-bit keys KNASenc KNASint

Trunc Trunc

256 256

128 128

256

256 256

NAS-enc-alg, Alg-ID

NAS-int-alg, Alg-ID

NAS COUNT

KDF KDF

256-bit keys KRRCenc KRRCint

128-bit keys KRRCenc KRRCint

Trunc Trunc

256 256

128 128

256 256

RRC-enc-alg, Alg-ID

RRC-int-alg, Alg-ID

UP-enc-alg, Alg-ID

256 256 Physical cell ID

256 KD

F

256

C-RNTI 256 KeNB

eNB

eNB

KeNB*

KDF

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN16

Key derivations, terminal side ME

Ks

KDF

256

256

network-ID

KeNB

KASME

256

KDF

KD

F

KDF KDF

256-bit keys KNASenc KNASint

128-bit keys KNASenc KNASint

Trunc Trunc

256 256

128 128

256

256 256

NAS-enc-alg, Alg-ID

NAS-int-alg, Alg-ID

NAS COUNT

KDF KDF

256-bit keys KRRCenc KRRCint

128-bit keys KRRCenc KRRCint

Trunc Trunc

256 256

128 128

256 256

RRC-enc-alg, Alg-ID

RRC-int-alg,Alg-ID

UP-enc-alg, Alg-ID

256 256 Physical cell ID

256 KD

F

256

C-RNTI

256

KeNB*

KDF

KUPenc

KUPenc

Trunc

256

128

256

Page 9: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN17

Crypto-algorithms• Two sets of algorithms from Day One

• If one breaks, we still have one standing• Should be as different from each other as possible• AES and SNOW 3G chosen as basis ETSI SAGE to specify modes

• Rel-99 USIM is sufficient master key 128 bits• All keys used for crypto-algorithms are 128 bits but included possibility to add 256-bit

keys later (if needed)

• Deeper key hierarchy (one-way) key derivation function needed• HMAC-SHA-256 chosen as basis

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN18

Need for algorithm agility: example

time

Theory break of algo 2

Spec work for algo 3

Practical break of algo 2

Algo 3 implemented

Majority of terminal base supports algo 3

Page 10: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN19

Need for algorithm agility: example

time

Theory break of algo 2

Spec work for algo 3

Practical break of algo 2

Algo 3 implemented

Majority of terminal base supports algo 3

Dependent onone algo only

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN20

Caveat: Security of algorithm capability negotiation• Algorithm capabilities exchanged first without protection• Re-exchanged and verified once integrity protection is turned on

all integrity algorithms should resist real-time attacks in the beginning of the connection

• If this is not the case anymore, broken algorithm has to be withdrawn completely from the system

• In the same way as A5/2 is withdrawn from GSM

Page 11: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN21

Security for handovers• Extended key hierarchy allows fast key refreshing for intra-LTE handovers• Security context transferred in handovers with GERAN/UTRAN

• After completion of HO, possibility for key renewal

• Possibility to refresh keys also during long sessions with no handovers

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN22

Inter-working with non-3GPP networks• Two options for mobility between 3GPP and non-3GPP networks:

• Proxy Mobile IP: no user-specific security associations between the Proxy and Home Agent

• Client Mobile IP: for Dual Stack MIPv6, IPsec with IKEv2 is used

• IPsec tunnel (with evolved Packet Data Gateway) used in case the non-3GPP network is untrusted by the operator (of SAE network)

Page 12: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN23

SAE/LTE: SA3 specifications

• TS 33.401: SAE security architecture• TS 33.402: Security with non-3GPP accesses

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN24

Network domain security using IPsec• Inter-operator signaling is done via security gateways (a)• End-to-end security (b) can be added using key management with PKI,

see TS 33.310• 3GPP has also created TCAPsec (analogous to IPsec), see TS 33.204

Network A Network B

IntermediateIP network

a

a

a

b

SEGA SEGB

NEA NEB

Page 13: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN25

IMS home

IMS visited

PS domainbearer access security

authentication & key agreement,RFC 3310

securitymechanismAgreement,RFC 3329

Integrity (+ conf) protection, IPsec + 33.203

network domain security

IMS (SIP) security

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN26

WLAN interworking in 3GPP

• WLAN access zone can be connected to cellular core network• Shared subscriber database & charging & authentication (WLAN

Direct IP access)• Authentication between WLAN-UE and 3GPP AAA server• based on EAP (RFC3748)• EAP-SIM: based on GSM AKA and network authentication (RFC4186)• EAP-AKA: based on UMTS AKA (RFC4187)

• Shared services (WLAN 3GPP IP Access), e.g. access to IMS• Security is provided by IPsec tunnel between UE and PDG• WLAN-UE uses IKEv2 for tunnel establishment• EAP messages carried over IKEv2 terminate in AAA server.

• Service continuity is the next step

Page 14: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN27

Generic AuthenticationArchitecture (GAA)

• GAA consists of three parts (Rel-6):• TS 33.220 Generic Bootstrapping

Architecture (GBA) offers generic authentication capability for various applications based on shared secret. Subscriber authentication in GBA is based on HTTP Digest AKA [RFC 3310].

• TS 33.221 Support of subscriber certificates: PKI Portal issues subscriber certificates for UEs and delivers an operator CA certificates. The issuing procedure is secured by using shared keys from GBA.

• TS 33.222 Access to Network Application Function using HTTPS is also based on GBA.

NE

GBA

AP

Certificates

HSS

UE

GAA

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN28

GBA: Generic Bootstrapping

UE

HSS

BSF

UaUb

Zh Zn

NAF

• Bootstrapping Server Function (BSF) and the UE run AKA protocol, and agreed session keys are later used between UE and Network Application Function (NAF).

• After the bootstrapping, the UE and NAF can run some application-specific protocol where security is based on derived session keys

Page 15: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN29

MBMS Security Architecture (node layout)

BM-SC

BSFContentServer

BGW

BGW: Bearer Gateway (first hop IP-router)BM-SC: Broadcast/Multicast Service CenterBSF: Bootstrapping Server Function

Mobile Operator Network ContentServer

Internet

BM-SC can reside in home or visited network

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN30

Summary of MBMS Security• Service protection, not content protection in DRM-sense• Application layer solution which is bearer agnostic• Based on IETF and OMA protocols

• MIKEY for key delivery• SRTP for streaming protection• DCF for download protection

• GBA used for mutual authentication and distribution of shared secret

• Three-level key hierarchy for data protection • Specified in TS 33.246

Page 16: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN31

Secure channel between UICC and terminal• Background: security elements emerge in terminals, e.g. TPM in laptops, MTM in

mobile phones• It makes sense to secure the (local) interface between UICC and terminal, esp.

for scenarios where the user may be the enemy, e.g. broadcast• Secure transport specified by ETSI SCP group• Key management specified in TS 33.110

• Based on GBA

• “Sister” spec TS 33.259 provides key management between UICC-hosting device and a (remote) terminal

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN32

Lawful interception• 3GPP specifies required lawful interception mechanisms for all features• Call/message content and related data provided from certain network elements to

the law enforcement side• Assumes typically that the content appears in clear in the network element• End-to-end encryption is still possible if keys are provided

• No weak algorithms introduced for LI purposes• All 3GPP algorithms are publicly known

• National variations exist• Specified in TSs 33.106-108

Page 17: Role of Crypto in Mobile Communications · 5 © 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN Essential crypto-features in 2G, 3G, SAE/LTE Radio network control Core network GSM:

© 2008 Nokia Crypto_in_Mobile.ppt / 2008-05-28 / VN33

Summary• Number of cryptographic solutions still growing in mobile communications • 3GPP has provided 6 releases of security specifications• SAE/LTE security

• User plane security terminates in base station site• Extended key hierarchy• Covers interworking with non-3GPP networks• Cryptoalgorithms based on AES and SNOW 3G

• Other 3GPP features• 3GPP has specified several emerging standards that rely heavily on crypto• Lawful interception is not provided using weak algorithms but it puts constraints on

end-to-end security