资源描述:
《us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security.pdf》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、Cloning3G/4GSIMCardswithaPCandanOscilloscope:LessonsLearnedinPhysicalSecurityYuYujointworkwithJunrongLiu,F-XStandaert,ZhengGuoDawuGu,SunWei,YijieGe,XinjunXie密码与计算机安全实验室LabofCryptologyandComputerSecuritySomerecentupdates“WhentheNSAandGCHQcompromisedthesecurityofpotentiallybillionsofphones(3
2、G/4GencryptionreliesonthesharedsecretresidentontheSIM),theynotonlyscrewedthemanufacturer,theyscrewedallofus,becausetheonlywaytoaddressthesecuritycompromiseistorecallandreplaceeverySIM.”Outline•Background1)2G/3G/4G,(U)SIMSecurity2)Cryptology,2G/GSMAKAprotocol•Ourwork1)3G/4GAKAprotocolandMIL
3、ENAGEalgorithm2)SideChannelAttack/DifferentialPowerAnalysis3)Ourstrategy4)Results•SoundbytesOutline•Background1)2G/3G/4G,(U)SIMSecurity2)Cryptology,2G/GSMAKAprotocol•Ourwork1)3G/4GAKAprotocolandMILENAGEalgorithm2)SideChannelAttack/DifferentialPowerAnalysis3)Ourstrategy4)Results•SoundbytesB
4、ackgroundCellularnetworks(1-4G)•1G:analoguesignal•2G:GSMvs.CDMAdigitalsignal•3G/4G:UMTS/LTEhigh-speeddatatransmissionWhatisa(U)SIMcard?•(U)SIM=(Universal)SubscriberIdentityModule•(U)SIMisasmartcard(aminicomputer).•SIMstoresICCID(serialnumber),IMSI(USERid),secrets,etc.•Secreton2GSIM:masterk
5、eyK.•Secretson3G/4GUSIM:masterkeyK,andOPc,r1,r2,…,r5,c1,…,c5.•Currently,2G3G/4G5G•Anycryptographyin(U)SIM?Securitycompromisedbyrevealed/stolensecretsOutline•Background1)2G/3G/4G,(U)SIMSecurity2)Cryptology,2G/GSMAKAprotocol•Ourwork1)3G/4GandMILENAGEalgorithm2)SideChannelAttack/Differentia
6、lPowerAnalysis3)Ourstrategy4)Results•SoundbytesCryptologyinanutshellCryptology=“Cryptography”+“Cryptanalysis”•Cryptography(designing)Thedesignofcrypto-systemsthathelppreservevariousaspectsofinformationsecuritysuchasconfidentiality,integrity,authenticityandnon-repudiation.•Cryptanalysis(cod
7、e-breaking).1.Mathematical:breakacrypto-systemmathematically.2.Physical:breaktheimplementationofacrypto-system.Attacksinreallifeareoftenphysical.crypto-systeminputoutputWhatcryptographyisneededfor(U)SIM?•AKA(AuthenticationandKeyAgreement)•Authenticationisaproc