SlideShare une entreprise Scribd logo
1  sur  12
Authentications & Key
Agreement Protocols
3G/UMTS , 4G/LTE/EPS and their Enhancements
By
Ahmad Kabbara
UMTS AKA

2/12
UMTS Security Context
Done only at initialization
of the terminal

3/12
EMSUCU

4/12
Enhanced-EMSUCU(2 Solutions)

5/12
LTE - AKA

6/12
LTE – Security Context

7/12
SE - AKA

8/12
Advantages of SE - AKA:
• All transmission connections between the nodes of the EPS all
secured by asymmetric cyphering.

Inconvenients of SE – AKA:
• Vulnerable against Reject attack: Sending multiple A intercepted msgs
• Vulnerable against Service Blocking(MITM): change Snid
• Vulnerable against Brute Force or Intelligent Brute Force attack
against IMSI

9/12
EC – AKA

10/12
EC – AKA 2

11/12
Advantages of EC – AKA:
• Oppose the dictionary attack against IMSI by the generation of Dynamic IMSI
• Always guarantees to have dynamic Cyphering and Integrity Keys on
each User Attach Request.

Inconvenients of EC – AKA:
• Vulnerable against Reject Attack :by intercepting msg A.*solved by ECAKA2

• Vulnerable against Denial of Service Attack against HSS/AuC by
sending multiple A msgs.
• Vulnerable against MITM Attack: Compromise the Av by knowing PKM
change msg B ot B’ by changing Snid to another authorized one.
12/12

Contenu connexe

En vedette

E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTVikas Kumar
 
E ball technology ppt b
E ball technology ppt bE ball technology ppt b
E ball technology ppt bVikas Reddy
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxtharinduwije
 
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...CSCJournals
 
Lte security overview
Lte security overviewLte security overview
Lte security overviewaliirfan04
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTESofian .
 
Throughput Calculation for LTE TDD and FDD System
Throughput Calculation for  LTE TDD and FDD SystemThroughput Calculation for  LTE TDD and FDD System
Throughput Calculation for LTE TDD and FDD SystemSukhvinder Singh Malik
 

En vedette (11)

E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORT
 
E ball technology ppt b
E ball technology ppt bE ball technology ppt b
E ball technology ppt b
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
 
LTE Evolution: From Release 8 to Release 10
LTE Evolution: From Release 8 to Release 10LTE Evolution: From Release 8 to Release 10
LTE Evolution: From Release 8 to Release 10
 
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobi...
 
Lte security overview
Lte security overviewLte security overview
Lte security overview
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
CS Services in LTE
CS Services in LTECS Services in LTE
CS Services in LTE
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTE
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
Throughput Calculation for LTE TDD and FDD System
Throughput Calculation for  LTE TDD and FDD SystemThroughput Calculation for  LTE TDD and FDD System
Throughput Calculation for LTE TDD and FDD System
 

Dernier

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 

Dernier (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

LTE & UMTS Protocols + Enhancement Protocols

  • 1. Authentications & Key Agreement Protocols 3G/UMTS , 4G/LTE/EPS and their Enhancements By Ahmad Kabbara
  • 3. UMTS Security Context Done only at initialization of the terminal 3/12
  • 7. LTE – Security Context 7/12
  • 9. Advantages of SE - AKA: • All transmission connections between the nodes of the EPS all secured by asymmetric cyphering. Inconvenients of SE – AKA: • Vulnerable against Reject attack: Sending multiple A intercepted msgs • Vulnerable against Service Blocking(MITM): change Snid • Vulnerable against Brute Force or Intelligent Brute Force attack against IMSI 9/12
  • 11. EC – AKA 2 11/12
  • 12. Advantages of EC – AKA: • Oppose the dictionary attack against IMSI by the generation of Dynamic IMSI • Always guarantees to have dynamic Cyphering and Integrity Keys on each User Attach Request. Inconvenients of EC – AKA: • Vulnerable against Reject Attack :by intercepting msg A.*solved by ECAKA2 • Vulnerable against Denial of Service Attack against HSS/AuC by sending multiple A msgs. • Vulnerable against MITM Attack: Compromise the Av by knowing PKM change msg B ot B’ by changing Snid to another authorized one. 12/12

Notes de l'éditeur

  1. Possible Attacks: Attaque de déni de service, Modification des capacités de sécurité d’UE, Attaque sur le message de rejet du mode de sécuritéModification des messages AKA (RAND, AUTN et RES),Attaques contre la clé secrète permanente K,Attaque sur la voie radio,Attaque contre la carte à puce UICC,Attaqued’homme au milieu (MITM), Attaques sur les réponses des données d’authentification (AVs),Attaque de l’extérieur, Attaque de l’intérieur,
  2. IMSI Protection by encrypting IMSI to avoid IMSI Catching and user Traceability
  3. First Solutions : Integrity Protection of all MessagesSecond Solution: Key K Protection
  4. chiffrement à clés asymétriques, de presque tous les messages échangés entre les différentesentités du réseau.Vulnerable Contreuneattaque par dictionnaire, attaque par rejoue, attaque dedéni de service sur le HSS/AuC et sur l’UE, et attaque MITM.The public key encryption is used to resist the replayAttack.This AKA has no longer need for the SQN to ensure the freshness of the Av, since Av can not be decrypted and Kasmeca not be avquired.Inconvenient: the cyphering of IMSI at first is considered a secure way of view but all the msg is in plain text and can be broke by Intelligent Brute Force.Attaque par dictionnaire : by building a table of authorised IMSIs Denial of Service Attack: by intercepting the attach request msg and and send it back so he will use all the ressources to do a denial of service attack against HSS/AuC when doing multiple of this procedure .Service Blocking AttacK : done by MITM by intercepting msg B and changing the Snid to another authorized oneDenial of Service attack against UE: by changing the RES sent in clear text Cause: Lack of Source Authentication and msgsIntegrity.Only Use of Asymetric Cyphering Algorithms
  5. chiffrement asymétrique pour chiffrer les messages A, B, et C en se basant sur les clés publiques de HSS (PKH), et de MME (PKM), et surle chiffrement symétrique pour chiffrer les autres messages D, E et F en se basant sur la clé de chiffrement EK générée dans l’UE et dans le HSS, et envoyé par ce dernier au MME.Use of AsymetricCypheringAlgorithms for msgs A,B,C and SymetricCypheringAlgorithms for msg D,E,F
  6. EC-AKA2 vs EC-AKA EC-AKA2 has the following enhancements over EC-AKA: EC-AKA2 has added SNID in the NAS Attach Request to become immune to the MITM attack discussed in the serving network authentication leading to UE tracking. EC-AKA2 has adopted a restriction over EC-AKA during handover; if when a new eNB having no access to the old eNB and requesting the UE to send its IMSI, EC-AKA2 forces the UE to re-run an EC-AKA2 instance. This modification in EC-AKA2, will immune the protocol against the threat “User tracking due to linkability of IMSI/TMSI and RNTI”. EC-AKA2 forces the system to change the used TMSI after changing the UE’s state to LTE_ACTIVE, thus abiding to 3GPP’s recommendations.