Chapter 3 - UMTS Flashcards

1
Q

What are some key points of UMTS?

A
  • Universal Mobile Telecommunications Standard
  • Also known as 3G
  • Originall 384 kbit/s, with enhancement HSPA+ 11 Mbit/s up- and 42 Mbit/s downlink
  • Circuit-switched architecture for voice
  • Packet-switched architecture for data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the components of the UMTS system architecture?

A
  • USIM: UMTS SIM
  • ME: Mobile equipment
  • UE: User equipment - USIM + ME
  • NodeB: Base Station
  • RNC: Radio Network Controller
  • UTRAN: Universal Terrestrial Radio Access Network
  • SGSN: Serving GPRS Support Node
  • GGSN: Gateway GPRS Support Node
  • HLR, VLR, AuC, MSC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some differences between GSM and UMTS, regarding the architecture?

A
  • USIM: 128 bit key Ki
  • Encryption endpoint at RNC (BSC) instead nodeB (BTS)
  • Packet traffic forwarded by SGSN to GGSN, then to Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the components of the UMTS authentication vector?

A
  • RAND: 128 bit random number
  • AUTN: 128 bit authentication token
  • IK: 128 bit integrity key
  • CK: 128 bit ciphering key
  • XRS: 32-128 bit expected respons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the components of the UMTS authentication token and why are they used?

A

AUTN := SQN ⊕ AK || AMF || MAC

  • SQN: Sequence Number of 48 bit - kept on AuC for each subscriber and incremented on each request
    • Guarantees Freshness of AUTN
  • AK: Anonymity Key of 48 bit calculated by f5(K_i, RAND)
    • Hides SQN
  • AMF: Authentication Management Field of 16 bit - home provider specific
    • e.g. indicate a set of algorithms to be used
  • MAC: Message Authentication Code of 64 bit - hash on ANF, SQN and RAND computed with f1 and K_i
    • Authenticates SQN, RAND, AMF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens if the SQN received by the UE is out of range? (UMTS)

A
  • UE creates an AUTS Token =SQN_MS ⨁ f5*Ki(RAND) ∥ MAC-S
    • SQN_MS = Maximum sequence number on UE
    • f5 = Anonymity key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is traffic encryption handled in UMTS?

A
  • Encryption optional
  • Between UE and RNC
  • Multiple encryption functions (f8 / UEA) possible
  • Currently UEA0 = no encryption, UEA1 = Kasumi, UEA2 = SNOW 3G are defined
  • Uses CK, COUNT-C, BEARER, DIRECTION and LENGTH as input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is integrity protection handled in UMTS?

A
  • Integrity protection of signalling traffic mandatory
  • 16 functions (f9 / UIA) possible
  • 2 defined: UIA1 = KASUMI, UIA2 = SNOW 3G
  • Uses IK, COUNT-I, MESSAGE, DIRECTION, FRESH
  • FRESH = 32 bit random value, set by RNC on security mode command to avoid replay attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is UMTS protected agains bidding-down attacks?

A

The RNC includes the received security capabilities in security mode command, which is integrity protected with IK. If the received capabilities differs, from the sended cap. the UE drops the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is the key usage time limited in UMTS?

A

Home provider specific THRESHOLD is set on USIM, to restrict key lifetime. UE uses START value = max (COUNTER-C, COUNTER-I). When START value reaches THRESHOLD, new AKA is triggered by UE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is security context handover handled in UMTS?

A
  • IK and CK are propagated to the new RNC
  • START value is carried on, because saved on USIM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What components are relevant for 2G/ 3G inter-working?

A
  • USIM/ 3G Home vs. SIM/ 2G Home
  • 2G BTS/BSC vs. 3G NodeB/ RNC
  • 2G MSC vs. 3G MSC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a UE/ USIM handle an AKA with a 2G network?

A
  • Normal 2G AKA
  • Authentication Vectors are converted from 3G to 2G in home network and on UE
    • Kc = CK1 xor CK2 xor IK1 xor IK2
    • RES_2G = RES_3G1 xor RES_3G2 xor RES_3G3 xor RES_3G4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a UE/ 2G SIM handle an AKA in a 3G network?

A
  • UE sends 3G security capabilities and initiates identification
  • 2G authentication vector send from home MSC
  • 2G AKA
  • UE and 3G convert Kc to IK* and CK*
    • CK* = Kc || Kc
    • IK* = Kc1 xor Kc2 || Kc || Kc1 xor Kc2
  • Proceed with 3G security context
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does a UE/ USIM handle an AKA in 2G RAN with 3G core?

A
  • Normal 3G AKA
  • On MSC and UE: Convert CK, IK to Kc
    • Kc = CK1 xor CK2 xor IK1 xor IK2
  • MSC sends Kc to BSC/BTS
  • Proceed with with 2G security context
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a UE/ SIM handle an AKA with 2G RAN with 3G core?

A
  • Normal 2G AKA
17
Q

How can an attack against a 3G be carried out?

A
  1. Impersonate UE to 3G network (requires IMSI) to obtain a valid RAND, AUTN token
  2. Impersonate 2G network to a UE and forward RES to the 3G network
  3. Send security mode command A5/0 to UE
  • Now calls / sms can be forwarded and be eavesdropped on