Chapter 2 - GSM Flashcards

1
Q

What is GSM?

A
  • 2G standard created by GSM group later 3GPP
  • 900/1800/1900 MHz
  • 9,6 KBit/s
    • Enhancement: 14,4 KBit/s uplink and 43,2 KBit/s downlink
  • Cell size: 100-500m in cities, up to 35km countryside
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What services are offered by GSM?

A
  • Bearer services
  • Telemetric services
  • Supplementary services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the components of a GSM network?

A
  • MS: Mobile Station
    • ME: Mobile Equipment (Phone)
    • SIM: Subscriber Identification Module (Smartcard)
  • Serving Network:
    • BSS: Base Station System (All equipment belonging to one MSC)
      • BTS: Base Transceiver Station (Antennas/ Cell)
      • BSC: Base Station Controller - controls multiple BTS
    • MSC: Mobile Switching Center - controls multiple BSC
    • VLR: Visitor Location Register (Database)
  • Home Network:
    • MSC
    • HLR: Home Location Register
    • AuC: Authentication Center
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where is the long term subscriber key Ki stored?

A

On the SIM and in the AuC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the tasks of the BSC and MSC?

A

BSC:
- Control multiple BTS
- Manage network resources
- Map radio channel to terrestrial channel
- Perform switching between BTS
MSC:
- Control multiple BSCs
- Route calls in the network
- Manage connections of mobile stations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between the VLR and HLR?

A

VLR:
- Data of all mobile stations currently registered in the network
- Phone number
- IMSI and TMSI
- Location area idenitifier
- Last MSC connected to
- HLR address
- Subscription profile
- Traffic information for billing
HLR:
- Data for each subscriber
- IMSI
- Phone number
- Pre-computed authentication vectors
- Current MSC and VLR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is the user identified in GSM?

A
  1. MS sends cipher capabilities to BTS/BSC
  2. MS sends TMSI to MSC
  3. If MSC knows TMSI proceed, else: MSC requests IMSI from MS

Result: MSC knows IMSI of MS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the IMSI and how is it structured?

A

International Mobile Subscriber Identifier

3 digit country code
2-3 digit mobile network code
9-10 digit mobile subscriber identification number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an GSM authentication vector?

A
  • RAND = 128 bit random challenge
  • RES = A3 (K_i, RAND)
    • 32 bit expected response
    • A3 algorithm family
  • Kc = A8 (K_i, RAND)
    • 64 bit secret encryption key

Requested by HLR from AuC, stored in HLR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is authentication and key agreement handled in GSM?

A
  • MSC retrieves IMSI and identifies home network
  • MSC requests authentication vectors from home MSC
  • MSC chooses one authentication vector and and sends RAND to MS
  • MS computes Kc = A8 (K_i, RAND) and RES* = A3 (K_i, RAND)
  • MSC checks if RES* == RES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is traffic encrypted in GSM?

A
  • Only on the air interface
  • After AKA, Kc is known to MSC and MS
  • MSC provides Kc to BTS
  • A5 stream cipher family using 64 bit key (implemented on ME and BTS)
    • A5/0 - no encryption
    • A5/1
    • A5/2 weak version of A5/1
    • A5/3 and A5/4 based on 3G cipher KASUMI
  • BTS selects A5 based on ME cipher capabilities
  • BTS send cipher mode command
  • MS sends cipher mode complete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is a handover done in GSM ?

A
  • Measurement phase
    • MS measures signal strength
    • BSC initiates handover if another BTS is more suitable
  • Initiation phase
    • Responsible MSC contacts new BTS
    • New channel selected
  • Kc transferred to new BSC (MSC if BSC in other BSS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main vulnerabilities of GSM?

A
  • No protection of user identity privacy
  • No network authentication
  • A3 weak
  • Some A5 weak (64 bit key insufficient)
  • No integrity protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does an IMSI catcher work in GSM?

A

The attacker pretends to be BTS of the home network and requests the IMSI from the MS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does network impersonation work in GSM?

A

The attacker impersonates a real BTS by selecting A5/0 encryption and choosing a random RAND. After the AKA the attacker can forward the traffic and eavesdrop, since no encryption is used.
This requires the attacker to have impersonate a real MSC to the GSM network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What attacks against A5 algorithms are known?

A
  • A5/2 totally broken (Kc known in couple milliseconds)
  • A5/1 weak against known-plaintext attacks
  • Several A5/2 ciphertext-only attacks with rainbow-tables
  • A5/3 related-key attack potential
17
Q

How is network impersonation combined with broken encryption used in GSM?

A
  • Attacker impersonates BTS and is connected to GSM network
  • Forwards AKA to real BTS and doesnt check RES
    Method 1:
  • Intercepts A5/x command from MSC
  • Sends A5/2 cipher mode command to MS
  • Break Kc
  • Decrypt A5/2 traffic and forward A5/x traffic to MSC
    Method 2:
  • Record and forward AKA and A5/x cipher mode command
  • Record encrypted traffic
  • Repeat AKA with MS using A5/2 to retrieve Kc
  • Decrypt recorded traffic
18
Q

How is an bidding down attack done in GSM?

A

The attacker intercepts the initial cipher capabilities message and sends an A5/0 only message to the BTS. The MSC selects A5/0 after the AKA.

19
Q

How do handovers affect the security in GSM?

A

Since the same key Kc is passed on at handover, a single BTS with a broken A5/x algorithm is enough to break Kc