outline
play

outline development of cryptographic algorithms for a real life - PDF document

Design and Analysis of Cryptographic Algorithms for Mobile Communication Systems Henri Gilbert Orange Labs {firstname.lastname@orange-ftgroup.com} research & development outline development of cryptographic algorithms for a real life


  1. Design and Analysis of Cryptographic Algorithms for Mobile Communication Systems Henri Gilbert Orange Labs {firstname.lastname@orange-ftgroup.com} research & development outline development of cryptographic algorithms for a real life application � introduction � cryptographic features of 2G and 3G systems � algorithms development process within ETSI/SAGE � approach to design / specification / evaluation � links with academic research � case studies � 1999: KASUMI block cipher + resulting encryption ( UEA1, A5/3 ) and MAC ( UIA1 ) � 2005: SNOW 3G stream cipher + resulting encryption ( UEA2 ) and MAC ( UIA2 ) 2000: MILENAGE authentication and key generation algorithm research & development Orange Group development of 3G algorithms (2)

  2. security in mobile systems Radio access network External networks Core Network (PSTN, IP…) � radio access security aspects: � terminal � core network MS = ME + (U)SIM � e2e transactions research & development Orange Group development of 3G algorithms (3) cryptographic algorithms of GSM � subscriber authentication RAND (challenge) � authentication & key generation algorithms A3/A8 128 128 � permanent subscriber key Ki (SIM & HLR) A3/A8 Ki � A3/A8 is not standardized (operator dependent) 64 32 SRES Kc � traffic and signalling encryption IV (frame nb.) 22 64 Kc A5 � circuit switched GSM: standard A5 algorithms A5/1, A5/2, A5/3 114-bit keystream (counter, dir.) IV � packet oriented GSM (GPRS): 33 64 standard GEA algorithms GEA1, GEA2, GEA3 GEA Kc* 5 to 1600-byte keystream research & development Orange Group development of 3G algorithms (4)

  3. GSM SECURITY: OVERVIEW HLR/AuC MSC/VLR BTS SIM ME RAND Ki visited network A3/A8 n triplets (RAND, SRES, Kc) off line SRES Kc on line RAND Ki SRES checks A3/A8 SRES start enc. Kc , start enc. Kc home Kc network ACK IV IV A5 A5 (frame nb.) (frame nb.) 114-bit keystream 114-bit keystream plain traffic &sig . plain traffic& sig. + encrypted traffic & sig. + research & development Orange Group development of 3G algorithms (5) limitations of GSM security � no network authentication and no explicit integrity protection � moreover encryption initiative is left up to the network � eavesdropping attacks using false base stations turned out to be a reality… ⇒ UMTS: network authentication and signalling messages auth. ⇒ GSM and UMTS: encryption indicator (in some mobiles) � limitations of GSM encryption � encryption ends at the base station => vulnerability of the BTS-BSC interface � efficient attack on A5/2, gradual erosion of the protection offered by A5/1 [Biham et al.] ⇒ UMTS: strong encryption (128-bit key, hopefully full strength), ends at RNC ⇒ GSM: move to A5/3 (derived from 3G algorithm KASUMI) research & development Orange Group development of 3G algorithms (6)

  4. cryptographic features of UMTS � mutual authentication (slightly simplified) RAND SQN AMF � subscriber auth. ≈ GSM auth 128 48 16 � generation of session keys CK and IK 128 K f2 f3 f4 f5 f1 � network auth. ≈ MAC of sequence nb. SQN � SQN anonymization: mask AK RES CK IK AK MAC-A f1-f5 also named AKA (auth. & key agreement) 64 128 128 48 64 no standard AKA; example AKA: MILENAGE IV (count-c, bearer, dir.) � traffic and signalling encryption 128 � two standard f8 algorithms 128 CK f8 • UEA1 derived from KASUMI • UEA2 derived from SNOW 3G keystream message + (count, fresh, direction) � message authentication � t wo standard f9 algorithms 128 • UEA1 derived from KASUMI f9 IK • UEA2 derived from SNOW 3G 32 MAC research & development Orange Group development of 3G algorithms (7) UMTS SECURITY: OVERVIEW HLR/AuC RAND, SQN USIM Node-B MSC/VLR K RNC ME f1-f5 n quintets (RAND,RES,IK,CK, AUTN) RES IK CK AUTN RAND, AUTN K RES checks RES f1-f5 home checks CK start enc. start enc., CK, IK CK AUTN ACK network IK IV IV f8 f8 { DATA || MAC } { DATA || MAC } + + encrypted traffic & sig. checks f9 f9 count, fresh count, fresh MAC research & development Orange Group development of 3G algorithms (8)

  5. ETSI/SAGE � what's that? � security algorithms group of experts of European Telecommunication Standard Institute � in charge of security algorithms standardisation for telecommunications ‒ mobile communication systems: 2G (GSM/GPRS), 3G (UMTS) … ‒ other systems: radio lans, teleconferencing, smart cards, inter-PNO exchanges, TETRA � created in the early 90's � initial mandate included liaison with national authorities to get export approval � membership � closed group: no longer for secrecy reasons, for efficiency reasons � ~ 10 telecom. operators or manufacturers with strong cryptography expertise � chaired by Gert Roelofsen until he left KPN research and since then by Steve Babbage, Vodafone research & development Orange Group development of 3G algorithms (9) export controls � before 98 � strong export restrictions on encryption , in particular for mobile systems ‒ A5/1 was much stronger than ciphers that were freely exportable at that time � no transparent rules, case by case approval � SAGE algorithms were not published ‒ this was needed to get export approval ‒ however, for massively deployed algorithms, secrecy does not last long… � since 98 (Wassenaar agreements) � export controls still exist… … but have been considerably eased and are no longer a real issue for mobiles � SAGE moved to public algorithms soon after 98 ‒ ☺ increase public confidence ‒ ☺ take advantage from publicly available designs ‒ other less decisive pros & cons: ☺ public evaluation after deployment, � increased vulnerability to side channel attacks research & development Orange Group development of 3G algorithms (10)

  6. SAGE approach to algorithms development "balance the benefits of public evaluation against industry timescales" [S. Babbage] 1. take the best from available research results � investigate most promising public designs � adapt design to specific requirements of the intended application � taking most recent advances in cryptanalysis into account 2. algorithm design /specification / evaluation work � set-up a project team with clear timescales and allocation of tasks � split participants into separate design and evaluation teams ‒ requirements capture (all) ‒ design team: 1st design, 2 nd design, final design ‒ evaluation team: mathematical evaluation, statistical testing � output: specification, ref. implementation and spec.testing, design & eval. report 3. Independent evaluation and follow-on research � evaluation reports by well known academic expert teams (limited evaluation time) � monitoring of (and often contribution to) follow-on public research research & development Orange Group development of 3G algorithms (11) Case study 1: KASUMI, UEA1, UIA1 (1999) � requirements (in brief) IV count-c bearer � stream cipher f8 and MAC f9 dir. ‒ security: full strength 128 ‒ low H/W complexity CK f8 ‒ good H/W and S/W performance ‒ f8: good IV agility keystream ⇒ block cipher with stream cipher & MAC modes message, count, fresh, dir. ‒ for flexibility reasons 128 f9 IK � available research results to start from � strategies to thwart statistical attacks: ‒ [Daemen-Rijmen]: wide trail strategy MAC ‒ [Vaudenay]: decorrelation theory and resulting block ciphers ‒ [Nyberg-Knudsen, Aoki]: differential & linear bounds on 3R-Feistel schemes [Matsui]: application to the embedded construction of MISTY block cipher ⇒ MISTY (a 64-bit block cipher) was selected as the starting point for the design ‒ MISTY's designer, M. Matsui (Mitsubishi) joined SAGE ‒ KASUMI ( ≈ "misty" in Japanese) was designed research & development Orange Group development of 3G algorithms (12)

  7. KASUMI plaintext (64 bits) 32 16 16 16 9 7 64 32 32 KOi1 S9 KL1 KO1, KI1 FIi1 zero-extend KIi1 FL1 FO1 S7 KO2, KI2 KL2 truncate KOi2 FO2 FL2 FIi2 KIi2 KIij1 KIij2 KL3 KO3, KI3 S9 FL3 FO3 KOi3 zero-extend FIi3 KIi3 KO4, KI4 KL4 F FO4 FL4 S7 truncate KL5 KO5, KI5 FL5 FO5 FI FO KO6, KI6 KL6 FO6 FL6 Main changes from MISTY1 32 16 16 - 4th round in FI KL7 KO7, KI7 KLi1 - FL: modified location, rotation FL7 FO7 - new S-boxes S7 and S9 KLi2 KO8, KI8 KL8 - simplified key schedule FO8 FL8 ↓ ≈ same conjectured security FL bitwise AND operation slightly lower H/W complexity bitwise OR operation ciphertext (64 bits) one bit left rotation research & development Orange Group development of 3G algorithms (13) KASUMI-based f8: UEA1 IV (64 bits) non-standard mode, combination of: -"prewhitening" (computation of secret A), - CNT mode - OFB mode 64-bit blocksize => standard modes would have resulted in strong 2 32 -block distinguishers CK(128 bits) keystream KS research & development Orange Group development of 3G algorithms (14)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend