Tuesday 7 June 2016

Authentication Principle

AUTHENTICATION PRINCIPLE

Authentication is a procedure used in checking the validity and integrity of subscriber data. With the help of the authentication procedure the operator prevents the use of false SIM modules in the network. The authentication procedure is based on an identity key, Ki, that is issued to each subscriber when his data are established in the HLR. The authentication procedure verifies that the Ki is exactly the same on the subscriber side as on the network side.




Authentication
Authentication is performed by the VLR at the beginning of every call establishment, location update and call termination (at the called subscriber side). In order to perform the authentication, the VLR needs the basic authentication information. If the mobile station was asked to broadcast its Ki, this would undermine the principle of authentication, because identification data would be sent across the air. The trick is to compare the Ki stored in the mobile with the one stored in the network without actually having to transmit it over the radio air interface. The Ki  is processed by a random number with a “one way” algorithm called A3 and the result of this processing is sent to the network. Due to the type of the algorithm A3, it is easy to get the result on the basis of Ki  and a random number, but it is virtually impossible to get the Ki on the basis of the result and random number (hence the name “one way” algorithm).
Since the security issue concerns confidentiality as well, the network uses more than one algorithm. These are introduced in the following sections.


Security Algorithms

The GSM system uses three algorithms for the purposes of authentication and ciphering. These algorithms are A3, A5 and A8. A3 is used in authentication, A8 is used in generating a ciphering key and A5 is used in ciphering.





Algorithms A3 and A8 are located in the SIM module and in the Authentication Center (AC). A5 is located in the mobile station and in the BTS.
Before an operator starts to use the security functions, the mobile subscriber is created in the Authentication Center. The following information is required in creating the subscriber:
o  IMSI of the Subscriber

o  Ki of the subscriber

o  Algorithm Version Used

The same information is also stored in the Mobile Subscriber's SIM. The basic principle of GSM security functions is to compare the data stored by the network to the data stored in the subscriber’s SIM. The IMSI number is the unique identification of the mobile subscriber. Ki is an authentication key with a length of 32 hexadecimal digits. The algorithms A3 and A8 use these digits as a basic value in authentication.

The Authentication Center generates information that can be used for all the security purposes during one transaction. This information is called an Authentication Triplet.

The authentication triplet consists of three numbers:
o  RAND

o  SRES

o  Kc.

RAND is a Random number, SRES (Signed Response) is a result that the algorithm A3 produces on the basis of certain source information and Kc is a ciphering key that A8 generates on the basis of certain source information.


Authentication Triplet


All the values included in the authentication triplet depend on each other i.e. a certain RAND inserted to the algorithms with a certain Ki always produces a certain SRES and a certain Kc.


When the VLR has this kind of three-value combination and the Mobile Subscriber authentication procedure is initiated, the VLR sends the random number RAND through the BSS to the SIM in the mobile station. As the SIM has (or it should have) exactly the same algorithms as used in triplet generation on the network side, the RAND number that the SIM receives and inserts to the algorithm should produce exactly the same SRES value as the one generated on the network side.




Authentication Procedure


If the SRES value in the authentication triplet is the same as the SRES calculated and sent by the mobile station, the authentication procedure is successful.
Services

Ciphering/Speech Encryption

Ciphering is used across the Air interface to provide speech and signalling encryption. When the authentication procedure has been completed successfully, the BTS and the mobile station are ready to start the ciphering procedure for further signalling and speech/data transmission.
The speech of the user and the ciphering key, Kc, are processed by the ciphering algorithm (A5) which produces the coded speech signal. 




No comments:

Post a Comment