16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

376 Chapter 17<br />

Ki (128 bit), RAND (128 bit)<br />

A8<br />

Kc (64 bit)<br />

Figure 17.4 : GSM K c generation<br />

any algorithm that it wishes to generate SRES from K i and RAND. The GSM specification<br />

just uses the name A3 to reference such an algorithm. Similarly, the service provider is also<br />

free to use any algorithm that it wishes to generate K c from K i and the name A8 is just used<br />

by the specification to reference this algorithm. Most GSM implementations combine the A3<br />

and A8 functionality and use a single algorithm to serve both the purposes. The COMP128<br />

algorithm, which is the reference algorithm specified in the GSM specification, takes as input<br />

the 128-bit K i and the 128-bit RAND and generates the 32-bit SRES and a 54-bit number.<br />

The 54-bit number is appended with 10-zeros to form the 64-bit session key: K c . We will see<br />

in Section 17.2.3 how this session key is used for providing confidentiality.<br />

GSM allows the service provider to choose an algorithm for A3 and A8 implementation<br />

while still ensuring seamless roaming among networks of different service providers. This<br />

is an important accomplishment and is achieved because even though the authentication<br />

process is carried out between the ME and the servicing MSC, the servicing MSC utilizes<br />

the HLR of the ME to authenticate the network. Indirectly therefore, it is the home<br />

network of the ME which authenticates the ME into another service provider’s network.<br />

Since the A3 and A8 algorithms need to execute only at the HLR and the SIM 9 (both of<br />

which “ belong to ” the service provider), they can be proprietary algorithms.<br />

One of the finer details of the authentication process in GSM is the use of five sets of<br />

security triplets that the MSC gets from the HLR. Even though only one set of triplets is<br />

required for authenticating a subscriber into the network, five sets are requested so as to<br />

improve roaming performance. Realize that a ME needs to authenticate with a MSC each<br />

time it enters its network from another service provider’s network. Instead of contacting<br />

the HLR for security triplets each time a ME roams into its coverage area, the MSC gets<br />

five sets of triplets: one for the current authentication process and four for future use. This<br />

reduces the roaming/handover time and improves system performance.<br />

9 The A3 and A8 algorithms are implemented in the SIM.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!