us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf

us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf

ID:33870043

大小:2.32 MB

页数:32页

时间:2019-03-01

us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf_第1页
us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf_第2页
us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf_第3页
us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf_第4页
us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf_第5页
资源描述:

《us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、Cloning3G/4GSIMCardswithaPCandanOscilloscope:LessonsLearnedinPhysicalSecurityYuYujointworkwithJunrongLiu,F-XStandaert,ZhengGuoDawuGu,SunWei,YijieGe,XinjunXie密码与计算机安全实验室LabofCryptologyandComputerSecuritySomerecentupdates“WhentheNSAandGCHQcompromisedthesecurityofpotentiallybillionsofphones(3

2、G/4GencryptionreliesonthesharedsecretresidentontheSIM),theynotonlyscrewedthemanufacturer,theyscrewedallofus,becausetheonlywaytoaddressthesecuritycompromiseistorecallandreplaceeverySIM.”Outline•Background1)2G/3G/4G,(U)SIMSecurity2)Cryptology,2G/GSMAKAprotocol•Ourwork1)3G/4GAKAprotocolandMIL

3、ENAGEalgorithm2)SideChannelAttack/DifferentialPowerAnalysis3)Ourstrategy4)Results•SoundbytesOutline•Background1)2G/3G/4G,(U)SIMSecurity2)Cryptology,2G/GSMAKAprotocol•Ourwork1)3G/4GAKAprotocolandMILENAGEalgorithm2)SideChannelAttack/DifferentialPowerAnalysis3)Ourstrategy4)Results•SoundbytesB

4、ackgroundCellularnetworks(1-4G)•1G:analoguesignal•2G:GSMvs.CDMAdigitalsignal•3G/4G:UMTS/LTEhigh-speeddatatransmissionWhatisa(U)SIMcard?•(U)SIM=(Universal)SubscriberIdentityModule•(U)SIMisasmartcard(aminicomputer).•SIMstoresICCID(serialnumber),IMSI(USERid),secrets,etc.•Secreton2GSIM:masterk

5、eyK.•Secretson3G/4GUSIM:masterkeyK,andOPc,r1,r2,…,r5,c1,…,c5.•Currently,2G3G/4G5G•Anycryptographyin(U)SIM?Securitycompromisedbyrevealed/stolensecretsOutline•Background1)2G/3G/4G,(U)SIMSecurity2)Cryptology,2G/GSMAKAprotocol•Ourwork1)3G/4GandMILENAGEalgorithm2)SideChannelAttack/Differentia

6、lPowerAnalysis3)Ourstrategy4)Results•SoundbytesCryptologyinanutshellCryptology=“Cryptography”+“Cryptanalysis”•Cryptography(designing)Thedesignofcrypto-systemsthathelppreservevariousaspectsofinformationsecuritysuchasconfidentiality,integrity,authenticityandnon-repudiation.•Cryptanalysis(cod

7、e-breaking).1.Mathematical:breakacrypto-systemmathematically.2.Physical:breaktheimplementationofacrypto-system.Attacksinreallifeareoftenphysical.crypto-systeminputoutputWhatcryptographyisneededfor(U)SIM?•AKA(AuthenticationandKeyAgreement)•Authenticationisaproc

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
相关文章
更多
相关标签