Nothing Special   »   [go: up one dir, main page]

WO2004098144A1 - An arrangement and a method relating to secure communication - Google Patents

An arrangement and a method relating to secure communication Download PDF

Info

Publication number
WO2004098144A1
WO2004098144A1 PCT/EP2003/004350 EP0304350W WO2004098144A1 WO 2004098144 A1 WO2004098144 A1 WO 2004098144A1 EP 0304350 W EP0304350 W EP 0304350W WO 2004098144 A1 WO2004098144 A1 WO 2004098144A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
algorithms
user station
protection
information
Prior art date
Application number
PCT/EP2003/004350
Other languages
French (fr)
Inventor
Krister Boman
Mats NÄSLUND
Original Assignee
Telefonaktiebolaget L M Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson (Publ) filed Critical Telefonaktiebolaget L M Ericsson (Publ)
Priority to PCT/EP2003/004350 priority Critical patent/WO2004098144A1/en
Priority to AU2003242524A priority patent/AU2003242524A1/en
Publication of WO2004098144A1 publication Critical patent/WO2004098144A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/67Risk-dependent, e.g. selecting a security level depending on risk profiles

Definitions

  • the present invention relates to an arrangement in a communication system, which comprises a switching serving node communicating with a user station over a radio access network which comprises an interface to the switching serving node.
  • a switching serving node communicating with a user station over a radio access network which comprises an interface to the switching serving node.
  • the user station means are provided for holding subscriber information and it supports a first set comprising a number of information protection algorithms, whereas the switching serving node supports a second set comprising a number of information protection algorithms.
  • the invention also relates to a user station communicating with the switching serving node over a radio access network with an interface to said node, wherein the user station is provided with means for holding subscriber information and supports a first set comprising a number of information protection algorithms.
  • the invention relates to a switching serving node interfacing an access network over an interface and which supports a number of information protection algorithms forming a second set for the purposes of algorithm negotiation between the said node and the user station.
  • the invention relates to a method for enabling secure negotiation of information protection algorithms between a user station and a switching serving node over a radio access network in a communication system, wherein the user station supports a first set of information protection algorithms and the switching serving node supports a second set of information protection algorithms.
  • the invention relates to increasing the security for communication in a communication system.
  • SGSN or MSC/BTS support which provides the highest degree of security that is possible bearing in mind what the terminal and the node support.
  • An attacker also called a man in the middle, can at any time interfere during the algorithm negotiation, and neither the network nor the terminal is able to detect an attacker, or a man in the middle, modifies a message sent between them.
  • algorithm negotiation takes place between the user station, e.g. an MS or a user equipment UE and SGSN (or CGSN) for GPRS or between MS and MSC for a GSM system.
  • encryption is then provided for between the user station and for example SGSN or the user station (MS) and the BTS.
  • GPRS encryption algorithms are known such as for example GEA1 and GEA2, both comprising 64 bit key.
  • a new GPRS encryption algorithm GEA3 is released and will be put into practice later on which comprises a 64-128 bit key, e.g. depending on what the networks supports.
  • user station e.g. MS or UE
  • SGSN/CGSN or MSC respectively which here are denoted switching serving nodes, may support different algorithms.
  • the older the terminal the less secure encryption algorithms are supported by the MS, and similar for the switching serving node.
  • still communication has to be allowed, and preferably, in each case, as securily as possible .
  • the signalling for negotiation of algorithms between the user station and for example the SGSN is handled using a three way handshake protocol.
  • This consists in the sending of a first message from the terminal or user station towards (here) the SGSN, comprising an Attach Request including information about which algorithms the terminal supports.
  • SGSN will choose a selected algorithm (common to the terminal and SGSN) and sends a second message comprising a challenge to the terminal in an Authentication and Ciphering Request.
  • the second message is received in the user station, it calculates a response and sends it towards the SGSN (message three) and the SGSN will then check that the response is valid.
  • signalling messages as well as user plane messages can 1 be encrypted with the selected algorithm.
  • Algorithm negotiation could be protected in different ways. However, apart from security issues having to be resolved, there are issues that relate to backward compatibility which need to be considered.
  • GSM A-interface
  • GPRS Gb-interface
  • GERAN GPRS Enhanced Radio Access Network
  • an object of the invention to achieve an improvement as to the security for algorithm negotiation for the interfaces referred to above while still reusing existing protocols and mechanisms, particularly without introducing any new signalling messages between the user station and the core network. It is an object to leave the signalling flow as unaffected as possible due to legacy reasons, i.e. to keep it as a three-way handshake protocol. Particularly it is an object to prevent, or at least as much as possible complicate, the possibility of attacks during algorithm negotiation.
  • a particular object is to enable for the switching serving node, e.g. SGSN, to verify whether secure negotiation was used or not. Particularly the node should be able to verify that secure negotiation was possible to use. It is also an object of the invention to suggest a solution that is applicable for legacy user stations and switching server nodes.
  • a particular object of the invention is to provide for protection of negotiation of encryption algorithms and/or of integrity algorithms .
  • the user station include a set of MAC (Message Authentication Code) algorithms in the first message 1 and that when the first message 1 is received in for example the SGSN, the latter would select the algorithm to be used and signal that back to the user station in a second message 2.
  • the user station might retransmit the algorithms that were proposed in the first message, but now protected with a MAC by using a key e.g. IK (Integrity Key) and/or CK (Cipher Key), K c or any other key.
  • IK Integrity Key
  • CK Cipher Key
  • the SGSN can be certain that the user station and the SGSN have agreed on the strongest possibly encryption algorithm.
  • the SGSN however needs to accept that legacy terminals use insecure negotiation. Even if SGSN is aware of the acceptability of insecure negotiation or not, this signalling flow can still be attacked by a man-in-the-middle as follows: It is supposed that an attacker first removes all information that includes MAC algorithms in the first message 1. When SGSN receives message 1, it can only select an encryption algorithm which possibly or potentially might be the weakest one as determined by the attacker. In message 2 the attacker can then add a MAC algorithm which is included in the message when sent towards the terminal.
  • the invention further suggests a user station as also initially referred to having the characterizing features of claim 19. Still further the invention suggests a switching serving node as initially referred to having the characterizing features of claim 26, as well as a method as initially referred to having the characterizing features of claim 30.
  • Fig. 1 very schematically illustrates a GSM/GPRS communication system in which the inventive concept can be implemented
  • Fig. 2 illustrates the current three-way signalling between a user station, with a USIM, and an SGSN for 3G,
  • Fig. 3 illustrates options that are available when a USIM is used as subscriber information holding means
  • Fig. 4 schematically illustrates a general embodiment of the inventive concept
  • Fig. 5 illustrates one embodiment in which cipher block codes are used as information protection codes in the algorithm negotiation
  • Fig. 6 illustrates a second embodiment in which cipher block codes are used as protection codes
  • Fig. 7 illustrates a first embodiment in which integrity algorithm (MAC) are used as protection codes
  • Fig. 8 illustrates a second embodiment in which integrity algorithms (MAC) are used and a checksum is calculated
  • Fig. 9 is a schematical flow diagram illustrating an implementation when a cipher block code is used and when indication is provided for indicating whether insecure negotiation is acceptable or not, and
  • MAC integrity algorithms
  • Fig. 10 is a schematical flow diagram illustrating an implementation with integrity algorithms (MAC) and when an indication is provided as to whether insecure negotiation is acceptable or not.
  • MAC integrity algorithms
  • Fig. 1 schematically illustrates a communication system to which the inventive concept could be implemented.
  • the figure illustrates a user station, here a mobile station MS with subscriber holding means in the form of a SIM-card (it could also be a USIM, UICC
  • a BSC Base Station Controller
  • GSM MSC/VLR Mobile Switching Center/Visitor Location Register
  • HLR Home Location Register
  • HSS Home Subscriber Server
  • SGSN Serving GPRS Support Node
  • PS packet switched communication
  • GSM Global System for Mobile Communications
  • PS packet switched data
  • CS circuit switched communication
  • GERAN GPRS Enhanced Radio Access Network
  • the present invention can with advantage be used in GERAN for example when operators want to provide for a smooth migration and increase the security as compared to the existing security level.
  • Established encryption algorithms are for example, for GPRS, GPRS encryption algorithms GEA1 and GEA2 both with 64 bit keys.
  • a new GEA, GEA3, comprises 64-128 bit keys.
  • the corresponding algorithms are A5/1, A5/2, A5/3.
  • the inventive concept is of course applicable to any future algorithms .
  • the inventive concept will in the following mainly be discussed with reference to packet switched communication over the G b interface, but it is likewise applicable for circuit switched communication over the A-interface between BSC and MSC/VLR.
  • a solution is suggested which is based on reusing existing protocols and mechanisms between the user station and the respective switching serving node, e.g. SGSN, CGSN or MSC, without introducing any new signalling.
  • a USIM-card should be used since the security level with the SIM-card is lower than that for a USIM-card.
  • SIM 2G card
  • USB 3G card
  • UICC may of course also be used advantageously, but not necessarily, it (USIM or UICC) would be preferred as it would present an easier way to progress considering the different options available in 3GPP TS 33.102.
  • the key length should be increased from 64 bits to 128 bits for all different options in said 33.102, which would have a big impact on the communication between HLR and SGSN as well as in the terminal etc.
  • legacy terminals/nodes have to be accepted.
  • the GEA3 algorithm has been designed such that it can support up to 128-bit keys. However, this characteristic is not signalled between the UE and SGSN in the current specifications.
  • the technical specification 3GPP TS 55.216 specifies the length of a key being 64-128 bits long. The length of the key can be signalled in the MS Network Capability (a new field is required), cf. technical specification TS 24.008. Also the SGSN needs to send the information back, i.e. what algorithm and potentially what key length it has chosen in the Authentication and Ciphering Request, which would mean that a new field is required.
  • 3GPP TS 55.216-219 are herewith incorporated herein by reference .
  • Fig. 2 an overview of the signalling between an MS and an SGSN is given. It is here supposed that an USIM is used instead of an ordinary SIM-card. It is supposed that said USIM is able to provide the keys CK (Cipher Key) , IK (Integrity Key) and K c (Cipher Key for 2G) to the mobile station MS which over GERAN communicates with an SGSN.
  • CK Cipher Key
  • IK Integrity Key
  • K c Cipher Key for 2G
  • the MS sends a first message MSG 1 comprising an Attach Request to the SGSN, which responds with a second message MSG 2 comprising an Authentication and Ciphering Request (RAND) , whereupon the MS responds with a third message, MSG 3, comprising an Authentication and Ciphering Response (RES) to the SGSN.
  • MSG 1 comprising an Attach Request
  • MSG 2 comprising an Authentication and Ciphering Request
  • RES Authentication and Ciphering Response
  • the SGSN receives a Quintet comprising CK, IK, AUTN, RAND and XRES .
  • the Attach Request is further described in GPRS technical specification TS 24.008 10.5.5.12 whereas the Authentication and Ciphering Request is described TS 23060 6.8.1.1 which herewith are incorporated herein by reference.
  • Fig. 3 shows the different options when a USIM is inserted in the mobile station.
  • the different options are defined in 3G TS 33.102, which also is incorporated herein by reference. It should be noted a case when a Quintet is delivered to a Release 99+ SGSN for GSM BSS access and ME is AKA (Authentication and Key Agreement) capable.
  • the USIM calculates keys and puts them in the mobile station, the keys being CK, IK, K c for UMTS and K c for GSM and terminals are denoted R99+ ME for UMTS and R98- ME or RE99+ ME or R98- ME* for GSM.
  • SRES is relevant for 2G, and corresponds to XRES of 3G, i.e. expected response. As referred to above, this is further explained in 3G TS 33.102.
  • the inventive concept is based on the assumption of keeping the signalling flow intact, i.e. keeping it a three-way handshake protocol.
  • the SGSN should be able to verify whether secure negotiation was possible.
  • the home operator should be able to control the use of insecure negotiation by means of a flag in the subscriber information holding means, e.g. USIM.
  • a date (or an event) is given at the occurrence of which insecure negotiation is not allowed.
  • these solutions should also function satisfactorily for legacy user stations or UEs and SGSNs (or MSCs etc. ) .
  • a (an integrity algorithm) MAC could be used as a information protection code. Then the UE and the SGSN (for example) should also negotiate the MAC algorithms, i.e. in the Attach Request the UE would not only indicate the encryption algorithms it supports, but also the integrity algorithms it supports (new fields would be required) .
  • the algorithms proposed by the UE should be repeated, but now protected with a MAC.
  • the SGSN Upon reception of this message, the SGSN should check the authenticity of the message and only accept it if the result of the checkup is successful, otherwise the message should be discarded. Since legacy terminals cannot support this feature, the SGSN has to accept that message three sometimes might be unprotected. In order to facilitate some home control, it should be possible for the operator to set a flag in the USIM, such that the terminal is able to decide whether insecure negotiation is acceptable or not .
  • MAC algorithms that could be used could for example be AES (Advanced Encryption Standard) , which is cipher block code, in CBC MAC as defined in IS09797 and HMAC SHA1.
  • AES Advanced Encryption Standard
  • CBC MAC cipher block code
  • HMAC SHA1 HMAC SHA1.
  • the third message might contain the algorithms proposed by the terminal in message 1 as well as a MAC of for example 96-128 bit calculated over appropriate parts of this message.
  • the appropriate key to use for the MAC could for example be the IK of (Integrity Key) with 128 bits.
  • Attach Request (A,B,C,D, AES MAC, HMAC SHAl), i.e. the message M would read A,B,C,D, AES MAC, HMAC SHAl.
  • There algorithms may use specific parameters, and if so, they should also be sent.
  • a block cipher might e.g. need an Initialisation Vector (IV). Then these parameters also have to be sent. This is not shown in the figures .
  • SGSN when SGSN receives message M', SGSN has to choose algorithm A and SGSN then sends it towards the user station along with the challenge.
  • SGSN does not know whether the user station supports secure negotiation or not.
  • An attacker may for example add a MAC algorithm identifier, for example AES MAC to the second message subsequently sent by the SGSN.
  • AES MAC MAC algorithm identifier
  • the terminal calculates the response RES and the keys IK and CK based on the challenge received from SGSN and selects algorithm A as encryption algorithm.
  • the terminal also calculates a MAC using IK and AES MAC protecting the necessary parts, i.e. the repeated algorithms .
  • the attacker can now remove the MAC tag and all the repeated algorithms sent towards the SGSN.
  • SGSN will not detect the attack. When SGSN receives this message it will just check the RES and assume that algorithm A had been chosen.
  • This scheme could, according to the invention, be modified if the protocol should provide secure negotiation between the terminal and the SGSN.
  • the above example illustrates that the SGSN was not able to establish or verify that it would have been possible to use secure negotiation since the attacker could bid down. This means that the SGSN does not know what the policy in the user station mandates.
  • a MAC tag could be added to third message, which then would be calculated over CK and/or IK or any other key and message M. An attacker could still remove this part, but then the flag in the USIM should indicate if this message (without any MAC algorithm indication nor MAC itself) is acceptable or not. The added value by using MAC itself, i.e.
  • the message, the third message, from the user station towards the SGSN, could be secured.
  • SGSN cannot be certain if UE is capable of secure negotiation or not and should accept that insecure negotiation could take place. Such an implementation will be discussed further down.
  • Fig. 4 illustrates a general implementation of the inventive concept.
  • the figure illustrates the user station communicating over GERAN and the G b interface with an SGSN.
  • the user station sends a first message, MSG 1 comprising an Attach Request to the SGSN.
  • MSG 1 comprising an Attach Request to the SGSN.
  • the user station supports algorithms Al, A2, A3, A4 and BI, B2.
  • SGSN stores the algorithms A1-A4 and BI, B2 and thereupon selects algorithms after having compared which algorithms in the attached request that itself supports, i.e. algorithms that are in common are supported both by the user station and the SGSN, preferably the algorithms providing the highest security.
  • both the user station and the SGSN support algorithms A4 and B2 and therefore these algorithms are selected.
  • MSGSN then sends a message MSG 2 to the user station comprising a challenge and information about the selected algorithms, i.e. A4, B2.
  • the RES as well as the keys CK and IK are calculated or established. This is done based on the challenge with the assistance, in one implementation, of the subscriber holding means, which for example may be an USIM.
  • the calculations and encryptions are performed by the user station (e.g. MS) and/or the subscriber information holding means (e.g. USIM, UICC).
  • MSG 3 is encrypted as well as RES using B2 and e.g. IK/CK.
  • MSG 3 comprising a response and the original message encrypted with e.g. IK/CK using B2.
  • SGSN comprises decrypting means for decrypting MSG 3 and thereupon it performs a comparing operation to establish whether the algorithms in MSG 3 are the same as the algorithm in MSG 1. If yes, the session proceeds, otherwise it is terminated. If the algorithms are not the same, the session should only proceed if it is explicitly indicated that insecure negotiation is acceptable. If there is no indication possibility as to that effect, the procedure is generally terminated unless there is a general agreement that insecure negotiation should be allowed as far as some kind of indication is provided to the user station and/or the SGSN that insecure negotiation actually does take place. Various alternatives are possible.
  • the algorithms included in the messages are encryption algorithms, A1-A4 and information protection codes BI, B2.
  • Fig. 5 shows one particular implementation in which the information protection codes are cipher block code algorithms.
  • One particular example relates to a block cipher comprising AES
  • UE Advanced Encryption Standard
  • MSG 1 comprising an Attach Request with supported encrypted algorithms A1-A4 and cipher block code AES and potential parameters, e.g. IV, to SGSN
  • the switching serving node (or SGSN) receives MSG 1, it stores MSG 1, selects, in this case, algorithms D and AES (on condition that they are supported by the node as well) and sends those with a challenge back towards the UE including the selected algorithms and RAND.
  • the user station or UE calculates IK and CK as well as RES, and encrypts the repeated algorithms, i.e. the algorithms of the first message, MSG 1 using AES, preferably it also adds an indication that MSG 3 is encrypted.
  • the third message may be encrypted with key IK using AES, and particularly RES as well as the original message is encrypted.
  • the user station supports algorithms A1-A5, of which A5 has a key length of 128 bits.
  • information protection code it supports AES.
  • SGSN/CGSN stores MSG 1 and selects the highest protective and common algorithms, which here are supposed to be A5 (128) and AES.
  • MSG 2 is then sent to US comprising A5 (128), AES, RAND.
  • a flag is included in USIM indicating secure negotiation which is provided to US.
  • IK, CK and RES are calculated.
  • MSG 3 is encrypted as well as RES using AES with e.g. IK or CK.
  • a flag is provided to indicate encryption, i.e. that the message has been encrypted.
  • the third message MSG 3 is sent towards SGSN/CGSN and it is, as referred to above, encrypted with AES using for example IK, and A1-A5, AES, RES are encrypted.
  • CK, IK, XRES are provided to SGSN/CGSN from HLR.
  • SGSN/CGSN decrypts MSG 3, compares MSG 1 with MSG 3 and compares RES with XRES. If equal, the session proceeds, otherwise it is terminated.
  • the user station shall signal the cipher IV (Initialisation Vector) or any other paramter(s), which will create a need for sending additional bits. It should also be considered that there might be attacks against the cipher, but the AKA (Authentication and Key Agreement) protocol would be untouched since the SGSN checks the RES (against XRES) .
  • cipher IV Initialisation Vector
  • AKA Authentication and Key Agreement
  • insecure negotiation The flag as to the allowability of insecure negotiation or not is relevant since there might be old equipment on the market, that still do not support secure negotiation and that it for some time still must be accepted that insecure negotiation takes place. It is however important to know if secure negotiation actually is possible, and if still insecure algorithms are proposed or selected, this might be an indication that there has been an attack. If secure negotiation would be possible, then a session should, at an as early stage as possible be terminated, since an attack is plausible. It is also important for users, operators etc. to actually be aware of the fact that the communication might be insecure so that this knowledge may influence their acting.
  • Fig. 7 relates to another implementation as was briefly discussed above in an example on attacks when MAC algorithms are used as protection codes, i.e. instead of block cipher codes integrity algorithms can be used.
  • MSG 1 comprising an Attach Request to SGSN/CGSN indicating the algorithms supported by US, here algorithms A, B,C,D, and integrity algorithms AES-MAC, HMAC SHAl.
  • the set of algorithms is here indicated M.
  • SGSN stores MSG ,1 (M) , and selects for example D and AES MAC, on condition that these are supported also by SGSN. From HLR it receives a Quintet as discussed in Fig.
  • the subscriber information holding means comprises an USIM, which (here) is responsible for calculating RES, IK, CK using RAND and providing RES, IK, CK to US. It is here supposed that some kind of indication is available to the fact that, in this case, US supports secure negotiation and that secure negotiation is to be used.
  • MSG 3 comprising AES-MAC (IK, RES, M) wherein M is the message MSG 1.
  • An attacker could not tamper with this message, since a failure would occur in the SGSN.
  • the messages are equal or correct, which means that the user station or UE has been authenticated and it can be concluded that also M was correct, the session proceeds.
  • SGSN can now be certain that the user station was capable of secure negotiation.
  • the length of the MAC is as long as RES, at least 32 bits, but in an advantageous implementation it should be at least 96 bits as required for example HMAC-SHAl. It should be noted that this scheme might change the AKA protocol.
  • Fig. 8 illustrates an alternative implementation based on using MAC.
  • MSG 1 comprising an Attach Request, with supported encryption algorithms A,B,C,D, and supported integrity algorithms, AES-MAC, HMAC SHAl constituting message Ml to SGSN/CGSN.
  • SGSN stores Ml and selects common and the most secure algorithms (or according to any policy) , here for example D, AES-MAC.
  • MSG 2 towards UE comprising a challenge with D, RAND, AES-MAC, and a cryptographic checksum
  • AES-MAC e.g. CK and/or IK, ES-MAC, Ml
  • the session is proceeded, otherwise it is terminated.
  • the scheme is secure since the SGSN would detect the attack, whereas in the embodiment of Fig. 8 the attack or an attack could be detected earlier (in UE) . This is advantageous although it requires some extra overhead, since a MAC value has to be added from the SGSN which however might be insignificant.
  • UE sends a first MSG (Attach Request) to SGSN with the supported encryption algorithms (e.g. A,B,C,D) and the supported cipher algorithms, e.g. AES.
  • MSG Access Request
  • Ml the supported encryption algorithms
  • SGSN establishes which encryption algorithms and which cipher algorithms that are supported by SGSN and which are common with the algorithms supported by UE and received in Ml.
  • These algorithms (Ml) are also stored, 101.
  • SGSN selects algorithms according to a given policy, here it is supposed that SGSN selects for example D, AES, 102.
  • SGSN then sends a second message comprising RAND (challenge) with D, AES to UE, 103. Subsequently it is established if secure negotiation is requested, 104. If yes, it is established whether there is an indication that secure negotiation actually is used, 105. If not, the session is terminated. If the response was negative in step 104, i.e. secure negotiation is not requested, or if there was an indication that secure negotiation was used (and requested) , the session proceeds and UE calculates RES, IK, CK using RAND and encrypts Ml with AES and IK (RES,Ml) to provide a third message M3 and it also provides an indication that M3 is encrypted, 106.
  • Fig. 10 is a flow diagram schematically describing an embodiment in which integrity algorithms are used.
  • UE sends a first message (Attach Request) to SGSN with supported encryption algorithms (here e.g. A,B,C,D) and supported integrity algorithms, e.g. AES-MAC, HMAC SHAl, noted message Mli-
  • SGSN When received in SGSN (Mli*) , SGSN establishes which encryption and integrity algorithms that are supported by SGSN and establishes which algorithms are common with the algorithms provided in Mli*.
  • SGSN stores Mli*, 201. Subsequently SGSN selects algorithms according to a given policy, e.g. D, AES-MAC, 202.
  • M2 ⁇ RAND, AES- MAC, AES-MAC (IK, D, RAND, AES-MAC, Mli*)
  • M3 ⁇ RES
  • A-MAC IK, RES
  • AES- MAC IK, RES
  • the key length Preferably it should be possible to increase the key length to support any range from 64 bits to 128 bits long keys.
  • One way to do this would be reassume that only the use of USIMs can be granted the increased security level over BSS accesses including the use of a Release 99+ version of the HLR/AuC, the SGSN and the ME. It is then assumed that the terminal could indicate e.g. in a new field that it supports a key length of e.g. 128 bits, or more. Alternatively it could be signalled as a new algorithm. By mandating that a terminal supports enhanced security for Gb to protect message 3 with a cipher, e.g. AES, an increased security for agreeing on the strongest possible algorithm in common is facilitated.
  • a flag should be added in the USIM indicating if the terminal should accept that the SGSN is using insecure negotiation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to increasing the security for communication in a communication system, particularly for protection algorithms negotiation between a user station and a switching serving node supporting a first and a second set of protection algorithms respectively information about the first set (for the user station) received in a first message is stored in the switching serving node, which selects common algorithms fulfilling a given security policy, and returns a message to the user station, which obtains/provides a response, encrypts at least the information in the first message and sends it as a third message to the node, which decrypts said third message.

Description

Title:
AN ARRANGEMENT AND A METHOD RELATING TO SECURE COMMUNICATION
TECHNICAL FIELD
The present invention relates to an arrangement in a communication system, which comprises a switching serving node communicating with a user station over a radio access network which comprises an interface to the switching serving node. In the user station means are provided for holding subscriber information and it supports a first set comprising a number of information protection algorithms, whereas the switching serving node supports a second set comprising a number of information protection algorithms. The invention also relates to a user station communicating with the switching serving node over a radio access network with an interface to said node, wherein the user station is provided with means for holding subscriber information and supports a first set comprising a number of information protection algorithms. Further yet the invention relates to a switching serving node interfacing an access network over an interface and which supports a number of information protection algorithms forming a second set for the purposes of algorithm negotiation between the said node and the user station.
Still further the invention relates to a method for enabling secure negotiation of information protection algorithms between a user station and a switching serving node over a radio access network in a communication system, wherein the user station supports a first set of information protection algorithms and the switching serving node supports a second set of information protection algorithms.
Generally the invention relates to increasing the security for communication in a communication system.
STATE OF THE ART
In known systems, for circuit switched communication encryption is provided between a mobile station and a BTS (Base Transceiver Station) of a BSS (Base Station Subsystem) . For packet switched communication encryption is provided for between a mobile station or a user equipment (UE) and, in GPRS, a SGSN (Serving GPRS Support Node) . However, in current existing GSM networks there are no security measures taken whatsoever to ensure that a user station or a terminal and the network are able to agree on the strongest encryption algorithm that the terminal and the network have in common, i.e. that is supported by both. By strongest is here meant the algorithm that both the user station and the switching server node, i.e. SGSN or MSC/BTS support, and which provides the highest degree of security that is possible bearing in mind what the terminal and the node support. An attacker, also called a man in the middle, can at any time interfere during the algorithm negotiation, and neither the network nor the terminal is able to detect an attacker, or a man in the middle, modifies a message sent between them. In order to determine the strongest algorithm for encryption, algorithm negotiation takes place between the user station, e.g. an MS or a user equipment UE and SGSN (or CGSN) for GPRS or between MS and MSC for a GSM system. As referred to above, encryption is then provided for between the user station and for example SGSN or the user station (MS) and the BTS. For GPRS, GPRS encryption algorithms are known such as for example GEA1 and GEA2, both comprising 64 bit key. A new GPRS encryption algorithm GEA3 is released and will be put into practice later on which comprises a 64-128 bit key, e.g. depending on what the networks supports. Depending on user station, e.g. MS or UE, and SGSN/CGSN or MSC respectively, which here are denoted switching serving nodes, may support different algorithms. Generally, the older the terminal, the less secure encryption algorithms are supported by the MS, and similar for the switching serving node. However, still communication has to be allowed, and preferably, in each case, as securily as possible .
In the existing BSS it is very easy for a man in the middle, or an attacker, to change a proposed algorithm from the user station and hence being successful in a bidding down attack i.e. making the user station and the node agree on a weaker, or less protective, algorithm than necessary.
In today available specifications the signalling for negotiation of algorithms between the user station and for example the SGSN is handled using a three way handshake protocol. This consists in the sending of a first message from the terminal or user station towards (here) the SGSN, comprising an Attach Request including information about which algorithms the terminal supports. When this first message is received in SGSN, SGSN will choose a selected algorithm (common to the terminal and SGSN) and sends a second message comprising a challenge to the terminal in an Authentication and Ciphering Request. When the second message is received in the user station, it calculates a response and sends it towards the SGSN (message three) and the SGSN will then check that the response is valid. When these three messages have been successfully processed, signalling messages as well as user plane messages can1 be encrypted with the selected algorithm. Algorithm negotiation could be protected in different ways. However, apart from security issues having to be resolved, there are issues that relate to backward compatibility which need to be considered.
In today known systems an attacker can modify any of the three messages, he can for example modify the first message sent from the user station, indicating that algorithms 1, 2, 3 are supported, by simply modifying the message and excluding algorithms 2 and 3, thus making the SGSN (or whichever is the node) believe that the user station only supports algorithm 1. In similar ways the second and third messages can be manipulated and an attacker may actually make the user station and the node agree on the weakest algorithm that they have in common.
SUMMARY OF THE INVENTION
It is therefore an object of the present invention to provide an arrangement, as initially referred to, through which algorithm negotiation can be protected. Particularly it is an object to provide for secure, or as secure as possible, communication between a user station and a switching serving node (with the terminology introduced in this application) . Particularly it is an object of the invention to increase the security level for algorithm negotiation, particularly to increase the security level for the A-interface (GSM) and/or the Gb-interface (GPRS) in a radio access network, particularly GERAN (GPRS Enhanced Radio Access Network) . Particularly it is an object of the invention to achieve an improvement as to the security for algorithm negotiation for the interfaces referred to above while still reusing existing protocols and mechanisms, particularly without introducing any new signalling messages between the user station and the core network. It is an object to leave the signalling flow as unaffected as possible due to legacy reasons, i.e. to keep it as a three-way handshake protocol. Particularly it is an object to prevent, or at least as much as possible complicate, the possibility of attacks during algorithm negotiation. A particular object is to enable for the switching serving node, e.g. SGSN, to verify whether secure negotiation was used or not. Particularly the node should be able to verify that secure negotiation was possible to use. It is also an object of the invention to suggest a solution that is applicable for legacy user stations and switching server nodes. A particular object of the invention is to provide for protection of negotiation of encryption algorithms and/or of integrity algorithms .
To solve the problems it might e.g. be suggested that the user station include a set of MAC (Message Authentication Code) algorithms in the first message 1 and that when the first message 1 is received in for example the SGSN, the latter would select the algorithm to be used and signal that back to the user station in a second message 2. In the third message 3 the user station might retransmit the algorithms that were proposed in the first message, but now protected with a MAC by using a key e.g. IK (Integrity Key) and/or CK (Cipher Key), Kc or any other key. It should be noted that Kc is the cipher key for 2G, GSM, communications, whereas CK is the cipher key for 3G. If the MAC is correct, if the algorithm match the ones sent by the user station, the SGSN can be certain that the user station and the SGSN have agreed on the strongest possibly encryption algorithm. The SGSN however needs to accept that legacy terminals use insecure negotiation. Even if SGSN is aware of the acceptability of insecure negotiation or not, this signalling flow can still be attacked by a man-in-the-middle as follows: It is supposed that an attacker first removes all information that includes MAC algorithms in the first message 1. When SGSN receives message 1, it can only select an encryption algorithm which possibly or potentially might be the weakest one as determined by the attacker. In message 2 the attacker can then add a MAC algorithm which is included in the message when sent towards the terminal. When the user station, or the terminal, receives message 2 and possibly verifies if insecure negotiation is allowed, everything seems to be in order from the user station point of view. The user station then uses the added MAC algorithm in message 3 towards the SGSN. However, the attacker removes all MAC protection before forwarding the message to the SGSN. Such an attack would mean that the attacker is able to circumvent this protocol forcing the user station and the SGSN to agree on the weakest common algorithm. This possible attempt to a solution is given to highlight the problem. Thus, better solutions are needed.
Therefore the invention suggests an arrangement as initially referred to having the features of the characterizing part of claim 1.
The invention further suggests a user station as also initially referred to having the characterizing features of claim 19. Still further the invention suggests a switching serving node as initially referred to having the characterizing features of claim 26, as well as a method as initially referred to having the characterizing features of claim 30.
Particular and advantageous embodiments are given by the appended sub-claims . BRIEF DESCRIPTION OF THE DRAWINGS
The invention will in the following be further described, in a non-limiting manner, and with reference to the accompanying drawings, in which:
Fig. 1 very schematically illustrates a GSM/GPRS communication system in which the inventive concept can be implemented,
Fig. 2 illustrates the current three-way signalling between a user station, with a USIM, and an SGSN for 3G,
Fig. 3 illustrates options that are available when a USIM is used as subscriber information holding means,
Fig. 4 schematically illustrates a general embodiment of the inventive concept,
Fig. 5 illustrates one embodiment in which cipher block codes are used as information protection codes in the algorithm negotiation,
Fig. 6 illustrates a second embodiment in which cipher block codes are used as protection codes,
Fig. 7 illustrates a first embodiment in which integrity algorithm (MAC) are used as protection codes,
Fig. 8 illustrates a second embodiment in which integrity algorithms (MAC) are used and a checksum is calculated, Fig. 9 is a schematical flow diagram illustrating an implementation when a cipher block code is used and when indication is provided for indicating whether insecure negotiation is acceptable or not, and
Fig. 10 is a schematical flow diagram illustrating an implementation with integrity algorithms (MAC) and when an indication is provided as to whether insecure negotiation is acceptable or not.
DETAILED DESCRIPTION OF THE INVENTION
Fig. 1 schematically illustrates a communication system to which the inventive concept could be implemented. The figure illustrates a user station, here a mobile station MS with subscriber holding means in the form of a SIM-card (it could also be a USIM, UICC
(UMTS Inter Chip Card, hardware with applications SIM or USIM) ) . It provides for circuit switched communication, CS, over a BTS
(Base Transceiver Station) and a BSC (Base Station Controller) with a GSM MSC/VLR (Mobile Switching Center/Visitor Location Register) in turn communicating with a HLR (Home Location Register) or an HSS, (Home Subscriber Server) . Alternatively it might communicate with a SGSN (Serving GPRS Support Node) (packet switched communication, PS) in turn communicating with a GGSN
(Gateway GPRS Support Node) whereby said SGSN is in communication with a HLR (HSS) . As an alternative to an SGSN and a GGSN, the functionality of both these nodes can be included in a node denoted CGSN; the functioning will still be the same. BSC communicates with MSC/VLR over the A-interface whereas the Gb interface is used between BSC and SGSN. For GSM, encryption is provided for between MS and BTS whereas for GPRS or packet switched data (PS) encryption is provided for between MS and SGSN. For circuit switched communication (CS) algorithm negotiation takes place between MS and MSC/VLR (although encryption, or protection, only is provided up to BTS from MS) . For packet switched communication encryption is provided for between MS (US,UE) and SGSN.
In the standard body 3GPP it is worked on enhancing the security level for the A-interface/Gb interface in GERAN (GPRS Enhanced Radio Access Network) . The present invention can with advantage be used in GERAN for example when operators want to provide for a smooth migration and increase the security as compared to the existing security level. Established encryption algorithms are for example, for GPRS, GPRS encryption algorithms GEA1 and GEA2 both with 64 bit keys. A new GEA, GEA3, comprises 64-128 bit keys. For GSM the corresponding algorithms are A5/1, A5/2, A5/3. The inventive concept is of course applicable to any future algorithms .
The inventive concept will in the following mainly be discussed with reference to packet switched communication over the Gb interface, but it is likewise applicable for circuit switched communication over the A-interface between BSC and MSC/VLR. As referred to above, according to the inventive concept, a solution is suggested which is based on reusing existing protocols and mechanisms between the user station and the respective switching serving node, e.g. SGSN, CGSN or MSC, without introducing any new signalling. Preferably, but not necessarily instead of a SIM-card a USIM-card should be used since the security level with the SIM-card is lower than that for a USIM-card. A shift from a 2G card (SIM) to a 3G card (USIM) would strongly assist in facilitating the provision of security. An UICC may of course also be used advantageously, but not necessarily, it (USIM or UICC) would be preferred as it would present an easier way to progress considering the different options available in 3GPP TS 33.102. Advantageously the key length should be increased from 64 bits to 128 bits for all different options in said 33.102, which would have a big impact on the communication between HLR and SGSN as well as in the terminal etc. However, also legacy terminals/nodes have to be accepted.
The GEA3 algorithm has been designed such that it can support up to 128-bit keys. However, this characteristic is not signalled between the UE and SGSN in the current specifications. The technical specification 3GPP TS 55.216 specifies the length of a key being 64-128 bits long. The length of the key can be signalled in the MS Network Capability (a new field is required), cf. technical specification TS 24.008. Also the SGSN needs to send the information back, i.e. what algorithm and potentially what key length it has chosen in the Authentication and Ciphering Request, which would mean that a new field is required. 3GPP TS 55.216-219 are herewith incorporated herein by reference .
In Fig. 2 an overview of the signalling between an MS and an SGSN is given. It is here supposed that an USIM is used instead of an ordinary SIM-card. It is supposed that said USIM is able to provide the keys CK (Cipher Key) , IK (Integrity Key) and Kc (Cipher Key for 2G) to the mobile station MS which over GERAN communicates with an SGSN. It is supposed that the MS sends a first message MSG 1 comprising an Attach Request to the SGSN, which responds with a second message MSG 2 comprising an Authentication and Ciphering Request (RAND) , whereupon the MS responds with a third message, MSG 3, comprising an Authentication and Ciphering Response (RES) to the SGSN. The SGSN receives a Quintet comprising CK, IK, AUTN, RAND and XRES . The Attach Request is further described in GPRS technical specification TS 24.008 10.5.5.12 whereas the Authentication and Ciphering Request is described TS 23060 6.8.1.1 which herewith are incorporated herein by reference.
Fig. 3 shows the different options when a USIM is inserted in the mobile station. The different options are defined in 3G TS 33.102, which also is incorporated herein by reference. It should be noted a case when a Quintet is delivered to a Release 99+ SGSN for GSM BSS access and ME is AKA (Authentication and Key Agreement) capable. The USIM calculates keys and puts them in the mobile station, the keys being CK, IK, Kc for UMTS and Kc for GSM and terminals are denoted R99+ ME for UMTS and R98- ME or RE99+ ME or R98- ME* for GSM. SRES is relevant for 2G, and corresponds to XRES of 3G, i.e. expected response. As referred to above, this is further explained in 3G TS 33.102.
As referred to above, it is easy for a man-in-the-middle to change a proposed algorithm from the user station MS, UE and thus being successful in a bidding down attack.
One way to solve the problem would be to encrypt the third message (MSG 3) including the RES and the proposed algorithms utilising a cipher. A suitable MAC (Message Authentication Code) of appropriate length to protect the negotiation phase might be a feasible way. This will be further discussed below.
The inventive concept is based on the assumption of keeping the signalling flow intact, i.e. keeping it a three-way handshake protocol. Preferably the SGSN should be able to verify whether secure negotiation was possible. Advantageously the home operator should be able to control the use of insecure negotiation by means of a flag in the subscriber information holding means, e.g. USIM. Alternatively a date (or an event) is given at the occurrence of which insecure negotiation is not allowed. Preferably these solutions should also function satisfactorily for legacy user stations or UEs and SGSNs (or MSCs etc. ) .
As an example, a (an integrity algorithm) MAC could be used as a information protection code. Then the UE and the SGSN (for example) should also negotiate the MAC algorithms, i.e. in the Attach Request the UE would not only indicate the encryption algorithms it supports, but also the integrity algorithms it supports (new fields would be required) . In the third message (MSG 3 referred to above) , the algorithms proposed by the UE should be repeated, but now protected with a MAC. Upon reception of this message, the SGSN should check the authenticity of the message and only accept it if the result of the checkup is successful, otherwise the message should be discarded. Since legacy terminals cannot support this feature, the SGSN has to accept that message three sometimes might be unprotected. In order to facilitate some home control, it should be possible for the operator to set a flag in the USIM, such that the terminal is able to decide whether insecure negotiation is acceptable or not .
MAC algorithms that could be used could for example be AES (Advanced Encryption Standard) , which is cipher block code, in CBC MAC as defined in IS09797 and HMAC SHA1. Hence the third message might contain the algorithms proposed by the terminal in message 1 as well as a MAC of for example 96-128 bit calculated over appropriate parts of this message. The appropriate key to use for the MAC could for example be the IK of (Integrity Key) with 128 bits.
One way of using a MAC could as be follows: (Assuming that the terminal supports secure negotiation and algorithms A, B, C, D being the algorithms GEA1, GEA2, GEA3 with each a 64 bit key, and GEA3 with a 128 bit key respectively) . However, a straightforward protocol would not solve the problems with the bidding down attack as illustrated below, if for example the user station sends the following algorithms in the first message, (here an attacker is assumed to act as a man-in-the-middle) :
Attach Request (A,B,C,D, AES MAC, HMAC SHAl), i.e. the message M would read A,B,C,D, AES MAC, HMAC SHAl. There algorithms may use specific parameters, and if so, they should also be sent. A block cipher might e.g. need an Initialisation Vector (IV). Then these parameters also have to be sent. This is not shown in the figures .
It is here supposed that the man-in-the-middle removes algorithms B,C,D, AES MAC and HMAC SHAl algorithm identifiers from the message M, and consequently SGSN will receive a message M'=A, thus making SGSN believe that the user station only supports algorithm A.
As a consequence thereof, when SGSN receives message M', SGSN has to choose algorithm A and SGSN then sends it towards the user station along with the challenge. Here SGSN does not know whether the user station supports secure negotiation or not. An attacker may for example add a MAC algorithm identifier, for example AES MAC to the second message subsequently sent by the SGSN. Such an attack cannot be detected by the terminal. The terminal calculates the response RES and the keys IK and CK based on the challenge received from SGSN and selects algorithm A as encryption algorithm. The terminal also calculates a MAC using IK and AES MAC protecting the necessary parts, i.e. the repeated algorithms . The attacker can now remove the MAC tag and all the repeated algorithms sent towards the SGSN. SGSN will not detect the attack. When SGSN receives this message it will just check the RES and assume that algorithm A had been chosen.
This scheme could, according to the invention, be modified if the protocol should provide secure negotiation between the terminal and the SGSN. The above example illustrates that the SGSN was not able to establish or verify that it would have been possible to use secure negotiation since the attacker could bid down. This means that the SGSN does not know what the policy in the user station mandates. According to the invention a MAC tag could be added to third message, which then would be calculated over CK and/or IK or any other key and message M. An attacker could still remove this part, but then the flag in the USIM should indicate if this message (without any MAC algorithm indication nor MAC itself) is acceptable or not. The added value by using MAC itself, i.e. adding MAC itself, would be that the UE would be certain that if the MAC is present, the SGSN did actually receive the proposed algorithms in the first message M. Alternatively the message, the third message, from the user station towards the SGSN, could be secured. In the example above SGSN cannot be certain if UE is capable of secure negotiation or not and should accept that insecure negotiation could take place. Such an implementation will be discussed further down.
Fig. 4 illustrates a general implementation of the inventive concept. The figure illustrates the user station communicating over GERAN and the Gb interface with an SGSN. Hence the user station sends a first message, MSG 1 comprising an Attach Request to the SGSN. It is here supposed that the user station supports algorithms Al, A2, A3, A4 and BI, B2. SGSN stores the algorithms A1-A4 and BI, B2 and thereupon selects algorithms after having compared which algorithms in the attached request that itself supports, i.e. algorithms that are in common are supported both by the user station and the SGSN, preferably the algorithms providing the highest security. It is here supposed that both the user station and the SGSN support algorithms A4 and B2 and therefore these algorithms are selected. SGSN then sends a message MSG 2 to the user station comprising a challenge and information about the selected algorithms, i.e. A4, B2. On the user station side the RES as well as the keys CK and IK are calculated or established. This is done based on the challenge with the assistance, in one implementation, of the subscriber holding means, which for example may be an USIM. According to different implementations the calculations and encryptions are performed by the user station (e.g. MS) and/or the subscriber information holding means (e.g. USIM, UICC). Subsequently MSG 3 is encrypted as well as RES using B2 and e.g. IK/CK. Subsequently the user station sends the third message, MSG 3 comprising a response and the original message encrypted with e.g. IK/CK using B2. SGSN comprises decrypting means for decrypting MSG 3 and thereupon it performs a comparing operation to establish whether the algorithms in MSG 3 are the same as the algorithm in MSG 1. If yes, the session proceeds, otherwise it is terminated. If the algorithms are not the same, the session should only proceed if it is explicitly indicated that insecure negotiation is acceptable. If there is no indication possibility as to that effect, the procedure is generally terminated unless there is a general agreement that insecure negotiation should be allowed as far as some kind of indication is provided to the user station and/or the SGSN that insecure negotiation actually does take place. Various alternatives are possible.
In the embodiment above the algorithms included in the messages are encryption algorithms, A1-A4 and information protection codes BI, B2. Alternatively it also may be provided for integrity protection, i.e. also integrity algorithms may be protected by protection codes. This could mean that the first message comprises encryption algorithms A1-A5, integrity algorithms A6-A7, and that protection codes are B1,B2 to protect the negotiation of A1-A7.
Fig. 5 shows one particular implementation in which the information protection codes are cipher block code algorithms. One particular example relates to a block cipher comprising AES
(Advanced Encryption Standard) which is a cipher block code. It is also here supposed that the user station, here UE, supports AES. This makes it possible for the user station to protect the third message by encrypting repeated algorithms as well as the RES. Thus, it is here supposed that UE sends MSG 1 comprising an Attach Request with supported encrypted algorithms A1-A4 and cipher block code AES and potential parameters, e.g. IV, to SGSN
(or SGSN) . When the switching serving node (SGSN/CGSN) receives MSG 1, it stores MSG 1, selects, in this case, algorithms D and AES (on condition that they are supported by the node as well) and sends those with a challenge back towards the UE including the selected algorithms and RAND.
The user station or UE (subscriber holding means or actual MS) then calculates IK and CK as well as RES, and encrypts the repeated algorithms, i.e. the algorithms of the first message, MSG 1 using AES, preferably it also adds an indication that MSG 3 is encrypted. The third message may be encrypted with key IK using AES, and particularly RES as well as the original message is encrypted. When MSG 3 is received in SGSN, which preferably already at an earlier stage has been provided with CK, IK and the expected response XRES from the associated HLR, although this is indicated as taking place at this stage, SGSN decrypts MGS 3 and then it compares MSG 1 with MSG 3 and RES with XRES to establish if they are equal. If this is the case, the session proceeds, otherwise it should be terminated.
In the following an embodiment will be disclosed in which a flag is added in the USIM (supposing that USIM is used instead of SIM) such then the user station US (or more particularly UE) gets the RAND or challenge without any indication that secure negotiation is used, it can terminate the session based on the home operator policy, hence forcing a terminal to use secure negotiation. Over the time or in the long run it is feasible to require that SGSNs or CGSNs support secure negotiation of algorithms. An attack as discussed earlier in the application would not be successful. An attacker can no longer tamper with the message since the RES as well as the set of algorithms are encrypted. Hence, in Fig. 6, US sends MSG 1 comprising an Attach Request to SGSN/CGSN. It is here supposed that the user station supports algorithms A1-A5, of which A5 has a key length of 128 bits. In addition thereto, as information protection code it supports AES. As in the preceding case, SGSN/CGSN stores MSG 1 and selects the highest protective and common algorithms, which here are supposed to be A5 (128) and AES. MSG 2 is then sent to US comprising A5 (128), AES, RAND. A flag is included in USIM indicating secure negotiation which is provided to US. On the user station side IK, CK and RES are calculated. MSG 3 is encrypted as well as RES using AES with e.g. IK or CK. A flag is provided to indicate encryption, i.e. that the message has been encrypted. Then the third message MSG 3 is sent towards SGSN/CGSN and it is, as referred to above, encrypted with AES using for example IK, and A1-A5, AES, RES are encrypted.
It is supposed that CK, IK, XRES are provided to SGSN/CGSN from HLR. SGSN/CGSN decrypts MSG 3, compares MSG 1 with MSG 3 and compares RES with XRES. If equal, the session proceeds, otherwise it is terminated.
It should be noted that the user station shall signal the cipher IV (Initialisation Vector) or any other paramter(s), which will create a need for sending additional bits. It should also be considered that there might be attacks against the cipher, but the AKA (Authentication and Key Agreement) protocol would be untouched since the SGSN checks the RES (against XRES) .
The flag as to the allowability of insecure negotiation or not is relevant since there might be old equipment on the market, that still do not support secure negotiation and that it for some time still must be accepted that insecure negotiation takes place. It is however important to know if secure negotiation actually is possible, and if still insecure algorithms are proposed or selected, this might be an indication that there has been an attack. If secure negotiation would be possible, then a session should, at an as early stage as possible be terminated, since an attack is plausible. It is also important for users, operators etc. to actually be aware of the fact that the communication might be insecure so that this knowledge may influence their acting.
Fig. 7 relates to another implementation as was briefly discussed above in an example on attacks when MAC algorithms are used as protection codes, i.e. instead of block cipher codes integrity algorithms can be used. In Fig. 7 it is supposed that user station US sends MSG 1 comprising an Attach Request to SGSN/CGSN indicating the algorithms supported by US, here algorithms A, B,C,D, and integrity algorithms AES-MAC, HMAC SHAl. The set of algorithms is here indicated M. SGSN then stores MSG ,1 (M) , and selects for example D and AES MAC, on condition that these are supported also by SGSN. From HLR it receives a Quintet as discussed in Fig. 2 above comprising IK, CK, RAND, XRES, AUTN. The quintet may be provided/requested upon reception of MSG1, or an "old" quintet might already present in SGSN/CGSN. SGSN then sends MSG 2 towards the US comprising a challenge with D, AES-MAC, RAND. It is here also supposed that the subscriber information holding means comprises an USIM, which (here) is responsible for calculating RES, IK, CK using RAND and providing RES, IK, CK to US. It is here supposed that some kind of indication is available to the fact that, in this case, US supports secure negotiation and that secure negotiation is to be used. US then sends an MSG 3 comprising AES-MAC (IK, RES, M) wherein M is the message MSG 1. An attacker could not tamper with this message, since a failure would occur in the SGSN. The SGSN upon receiving MSG 3 calculates AES-MAC (IK, XRES, M) and compares this value with MSG 3. If MSG 3 = XMSG 3, the session proceeds, otherwise it is interrupted or terminated. Thus, if the messages are equal or correct, which means that the user station or UE has been authenticated and it can be concluded that also M was correct, the session proceeds. SGSN can now be certain that the user station was capable of secure negotiation. Preferably the length of the MAC is as long as RES, at least 32 bits, but in an advantageous implementation it should be at least 96 bits as required for example HMAC-SHAl. It should be noted that this scheme might change the AKA protocol.
Fig. 8 illustrates an alternative implementation based on using MAC. This case it is supposed that an UE sends MSG 1 comprising an Attach Request, with supported encryption algorithms A,B,C,D, and supported integrity algorithms, AES-MAC, HMAC SHAl constituting message Ml to SGSN/CGSN. As in the proceeding embodiments, SGSN stores Ml and selects common and the most secure algorithms (or according to any policy) , here for example D, AES-MAC. Thereupon it sends MSG 2 towards UE comprising a challenge with D, RAND, AES-MAC, and a cryptographic checksum
(e.g. 96 or 128 bits but also fewer or more bits are possible) AES-MAC (e.g. CK and/or IK, ES-MAC, Ml) . UE checks if AES-MAC is present, i.e. if the message indicates a selected MAC. If not, UE should abort the message since it is probably under attack. This could be controlled by the operator using a flag in the USIM allowing for a period that legacy SGSNs do not support secure negotiation. Otherwise, the UE derives RES and IK from RAND. It then verifies the MAC tag using the selected algorithm and the message Ml it sent initially. In this embodiment it verifies the checksum, and if it is in order, the session is proceeded, otherwise the message is aborted since this is an indication of an attack, e.g. due to the fact that the SGSN might have received a faked Ml in the first step or that the response in MSG 2 was faked. Otherwise the UE responds by RES, AES-MAC (IK, RES and possibly Ml). AES-MAC (...) is here denoted the MAC-UE. This case SGSN verifies the received message by comparing AES-MAC-SGSN (XRES) and MAC-UE, and also if RES = XRES
(wherein XRES is received from HLR or HSS as explained above) . If the result of these comparisons is affirmative, the session proceeds, otherwise it is terminated. This scheme is secure since UE is able to detect an attack at an earlier stage. In a similar alternative a message MSG 3' is sent (indicated with a dashed line in the figure) . In this case RES is included in the checksum and it is thus not sent open (as in the preceding case) . This is still more advantageous than the previous case in which RES was sent open. In this case AES-MAC-SGSN (M,XRES, IK) is compared to MAC-UE comprising the whole MSG 3'. If the result of the comparison is affirmative, the session is proceeded, otherwise it is terminated. In the embodiment discussed in Fig. 7, the scheme is secure since the SGSN would detect the attack, whereas in the embodiment of Fig. 8 the attack or an attack could be detected earlier (in UE) . This is advantageous although it requires some extra overhead, since a MAC value has to be added from the SGSN which however might be insignificant.
In Fig. 9 one implementation of the inventive procedure is described in the form of a flow diagram. In a first step, 100, UE sends a first MSG (Attach Request) to SGSN with the supported encryption algorithms (e.g. A,B,C,D) and the supported cipher algorithms, e.g. AES. This message is denoted Ml. When received in SGSN, SGSN establishes which encryption algorithms and which cipher algorithms that are supported by SGSN and which are common with the algorithms supported by UE and received in Ml. These algorithms (Ml) are also stored, 101. Subsequently SGSN selects algorithms according to a given policy, here it is supposed that SGSN selects for example D, AES, 102. SGSN then sends a second message comprising RAND (challenge) with D, AES to UE, 103. Subsequently it is established if secure negotiation is requested, 104. If yes, it is established whether there is an indication that secure negotiation actually is used, 105. If not, the session is terminated. If the response was negative in step 104, i.e. secure negotiation is not requested, or if there was an indication that secure negotiation was used (and requested) , the session proceeds and UE calculates RES, IK, CK using RAND and encrypts Ml with AES and IK (RES,Ml) to provide a third message M3 and it also provides an indication that M3 is encrypted, 106. When M3 is received in SGSN, SGSN decrypts M3, 107, and subsequently it examines if RES is equal to XRES (received from HLR) and if Ml = M3, 108. If yes, the session is proceeded 108A. If not, the session is terminated, 108B.
Fig. 10 is a flow diagram schematically describing an embodiment in which integrity algorithms are used. First, 200, UE sends a first message (Attach Request) to SGSN with supported encryption algorithms (here e.g. A,B,C,D) and supported integrity algorithms, e.g. AES-MAC, HMAC SHAl, noted message Mli- When received in SGSN (Mli*) , SGSN establishes which encryption and integrity algorithms that are supported by SGSN and establishes which algorithms are common with the algorithms provided in Mli*. SGSN stores Mli*, 201. Subsequently SGSN selects algorithms according to a given policy, e.g. D, AES-MAC, 202. SGSN calculates a checksum and sends a second message M2ι = RAND, AES- MAC, AES-MAC (IK, D, RAND, AES-MAC, Mli*), 203. As in the preceding embodiment, also in this case it is established if secure negotiation is requested, 204. If yes, it is established whether there is an indication about the use of secure negotiation, 205. If there is no such indication, the session is terminated, 205A. Otherwise, or if no secure negotiation was requested, the session proceeds and SGSN verifies whether AES- MAC of UE = AES-MAC of SGSN and if the checksum is correct, 206. If not, the session is terminated, 206A, if yes, UE sends a third message (M3ι) = RES, A-MAC (IK, RES) or alternatively AES- MAC (IK, RES) to SGSN, 207. In the second case RES is sent open, only included in the checksum, which might be advantageous. When M3ι is received in SGSN, SGSN calculates and checks if AES-MAC SGSN (XRES) = MAC-UE, and if RES = XRES or alternatively if AES- MAC SGSN (Ml, XRES, IK) = MAC-UE, 208. If yes, the session proceeds, 209, otherwise the session is terminated.
Preferably it should be possible to increase the key length to support any range from 64 bits to 128 bits long keys. One way to do this would be reassume that only the use of USIMs can be granted the increased security level over BSS accesses including the use of a Release 99+ version of the HLR/AuC, the SGSN and the ME. It is then assumed that the terminal could indicate e.g. in a new field that it supports a key length of e.g. 128 bits, or more. Alternatively it could be signalled as a new algorithm. By mandating that a terminal supports enhanced security for Gb to protect message 3 with a cipher, e.g. AES, an increased security for agreeing on the strongest possible algorithm in common is facilitated. Advantageously a flag should be added in the USIM indicating if the terminal should accept that the SGSN is using insecure negotiation.
Considering that all schemes for secure negotiation are intended to increase the security level it should be noted that the embodiments in which a block cipher code is used, this would not change the AKA protocol, whereas the alternatives being based on integrity algorithms to some extent would do so.
It should be clear that the concept likewise is applicable to the A-interface to MSC/VLR for circuit switched communication.
It should also be clear that the invention is not limited to the explicitly illustrated embodiments, but that it can be varied in a number of ways without departing from the scope of the appended claims.

Claims

1. An arrangement in a communication system (GPRS; UMTS; GSM) , which arrangement comprises a switching serving node (SGSN; CGSN;MSC) communicating with a user station (UE;MS) over a radio access network (GERAN; RAN) which comprises an interface (Gb; A- i/f) to the switching serving node, whereby in said user station (UE; MS) means are provided for holding subscriber information (USIM;SIM, UICC) , said user station supporting a first set comprising a number of information protection algorithms, and said switching serving node supporting a second set comprising a number of information protection algorithms, c h a r a c t e r i z e d i n that the switching serving node (SGSN;CGSN;MSC) comprises means for storing information about the first set of information protection algorithms received in a first message comprising a connection request (attach request; call set-up) from the user station (UE;MS) , and means for finding or selecting the information protection algorithm (s) providing the highest degree of protection and which are common for said first and second sets, a second message comprising a challenge including the selected protection algorithms being sent to the user station (UE;MS) , whereby in the user station, based on the information in the second message, at least a response (RES) is calculated, and in that it comprises encrypting means for, using the information in said second message, protecting at least the information in the original first message and for sending a third message comprising a response and the protected, e.g. encrypted first message information, and in that the switching serving node comprises decrypting means for decrypting the third message and for comparing the decrypted third message with said stored first message .
2. An arrangement according to claim 1, c h a r a c t e r i z e d i n that indicating means are provided to, in the user station, indicate whether, or to which extent, secure negotiation of information protection algorithms is supported or not.
3. An arrangement according to claim 2, c h a r a c t e r i z e d i n that said indicating means comprises a flag, flag = 0 e.g. indicating acceptance of insecure negotiation, flag = 1 e.g. indicating non-acceptance of insecure negotiation.
4. An arrangement according to claim 3, c h a r a c t e r i z e d i n that the flag setting can be changed via an OTA (over the air activation) provided by the communication system to indicate that said node supports secure negotiation.
5. An arrangement according to any one of the preceding claims, c h a r a c t e r i z e d i n that the means for holding subscriber information comprises a SIM-card.
6. An arrangement according to any one of claims 1-4, c h a r a c t e r i z e d i n that the means for holding subscriber information comprises a USIM or a UICC.
7. An arrangement according to any one of claims 1-6, c h a r a c t e r i z e d i n that the communications system is a packet data communication system, that the switching serving node comprises a packet data node, e.g. an SGSN or a CGSN.
8. An arrangement according to claim 7, c h a r a c t e r i z e d i n that the packet data communication system is GSM/GPRS or UMTS, that the user station is a user equipment (UE) , that the radio access network is a GERAN implementing the Gb-interface to the packet data node SGSN/CGSN.
9. An arrangement according to any one of the preceding claims, c h a r a c t e r i z e d i n that the first and second sets of information protection algorithms comprise a number of encryption algorithms, and/or a number of integrity algorithms, each with a specific security level, and a number of protection codes.
10. An arrangement according to claim 7, 8 or 9, c h a r a c t e r i z e d i n that the encryption algorithms comprise a number of GEA:s (GPRS Encryption Algorithms) .
11. An arrangement according to claim 10, c h a r a c t e r i z e d i n that at least one GEA comprises a key with more than 64 bits, e.g. a 128 bit key.
12. An arrangement according to claim 9, 10 or 11, c h a r a c t e r i z e d i n that the protection code(s) comprise integrity algorithms e.g.
Message Authentication Code (MAC) algorithms, e.g. based on AES
(Advanced Encryption Standard) and/or HMAC SHAl, and in that one of the integrity algorithm codes is used to encrypt the third message, i.e. at least the first message, the calculated response (RES) and an Integrity Key (IK) stored in SGSN/CGSN and the user equipment, and in that upon decryption of the third message, the response (RES) is compared to the expected response (XRES) received from the concerned HLR to establish whether the first message was correct.
13. An arrangement according to claim 2 or 3 and 9, 10 or 11, c h a r a c t e r i z e d i n that the protection code(s) comprise integrity algorithms, e.g. Message Authentication Code(s) (MAC) algorithms, e.g. based on AES and/or HMAC SHAl, or any other appropriate algorithm and in that one of the integrity algorithms is used to calculate a checksum of the first message from the UE including selected encryption algorithm, integrity algorithm, RAND, using IK and/or any other key received first message and a cryptographic checksum thereof (e.g. 96 bit, 128 bit or more) to provide the second message, and in that the user station verifies the validity of the integrity algorithm, i.e. if it is included in the second message, and verifies the checksum using the originally sent first message, whereby if the verification is unsuccessful, the UE terminates the attach procedure, otherwise it sends a third message encrypted using the selected integrity algorithm, i.e. by calculating a checksum.
14. An arrangement according to claim 13, c h a r a c t e r i z e d i n that the response (RES) is sent open, i.e. not encrypted or included in the checksum in the third message.
15. An arrangement according to claim 13, c h a r a c t e r i z e d i n that the response (RES) is included in the checksum calculated in the UE.
16. An arrangement according to any one of claims 9, 10 or 11, c h a r a c t e r i z e d i n that the protection code(s) comprise one or more cipher block codes, e.g. based on AES (Advanced Encryption Standard).
17. An arrangement according to claim 16, c h a r a c t e r i z e d i n that the first message, comprising the attach request, includes the encryption algorithms and the cipher block codes supported by the user station (UE) , that the switching serving node (SGSN; CGSN) selects encryption algorithm and cipher block code which are returned to the user station in the second message, the user station calculating the the response and relevant keys, e.g. IK, CK, based on the second message (challenge) and encrypting the algorithms of the second message using the selected cipher block code and one of the keys, e.g. IK, as well as the response (RES) , which is returned in the third message to the switching serving node, and in that an indication is provided to indicate that the third message is encrypted.
18. An arrangement according to claim 18, c h a r a c t e r i z e d i n that if no cipher block code is included in the second message, and if said second message is discarded, the attach procedure is terminated unless insecure negotiation is accepted.
19. A user station communicating with a switching serving node over a radio access network with an interface to said node, said user station being provided with a means for holding subscriber information and supporting a first set comprising a number of information protection algorithms, c h a r a c t e r i z e d i n that the information protection algorithms comprise a number of encryption and/or integrity algorithms and a number of protection codes, that the user station in a first message comprising a connection request, e.g. an attach request, to the switching serving node, provides information about said protection algorithms, that the user station comprises or is associated with means for calculating a response (RES) and possible keys (IK, CK) based on a second message, a challenge or an authentication and ciphering request, with selected information protection algorithms received from the switching serving means, and means for generating a third message comprising the response, the first message protected, e.g. encrypted using the selected protection code (and e.g. one of the possible keys) and for sending said third message to the switching serving node.
20. A user station according to claim 19, c h a r a c t e r i z e d i n that the user station comprises means for indicating whether insecure negotiation is acceptable or not.
21. A user station according to claim 20, c h a r a c t e r i z e d i n that said means comprises a flag.
22. A user station according to claim 21, c h a r a c t e r i z e d i n that the flag setting (0 or 1) can be controlled by means of an over the air activation (OTA) .
23. A user station according to claim 20, c h a r a c t e r i z e d i n that said indicating means are set/reset at a predetermined occasion or time.
24. A user station according to any one of claims 19-23, c h a r a c t e r i z e d i n that it is a GPRS/UMTS User Equipment, that the subscriber information holding means comprises a SIM/USIM/UICC and in that the information protection algorithms comprise a number of encryption algorithms, e.g. one or more of GEA1, GEA2, GEA3, (64 bit key), GEA3 128 bit key, GEA4... , and in that the protection codes comprise block cipher codes.
25. A user station according to any one of claims 19-23, c h a r a c t e r i z e d i n that the information protection algorithms comprise a number of encryption algorithms and a number of integrity algorithms and in that the information protection codes comprise cipher block codes or integrity algorithms for protecting the negotiation of said protection algorithms.
26. A switching serving node (SGSN;CGSN;MSC) interfacing a radio access network (RAN, GERAN) over an interface (A i/f; Gb) , and supporting a number of information protection algorithms forming a second set to be compared with a first set thereof supported by a connecting/attaching user station for the purposes of algorithm negotiation between the said node and the user station, c h a r a c t e r i z e d i n that the switching serving node (SGSN; CGSN; MSC) comprises means for storing information about the first set of information protection algorithms comprising protection codes received in a first connection/attach request message from a user station, means for finding or selecting the information protection algorithm(s) and protection codes that are common for said first and second sets and providing the highest possible degree of protection or based on a given policy, and in that the node returns a second message comprising a challenge (Authentication and Ciphering request) to the user station, and comprises decrypting means for decrypting a third, encrypted, message from the user station using at least the selected protection code and means for comparing a response as calculated by the user station with an expected response obtained from the home location register relevant for the requesting user station, such that if the response is not equal to the expected response or the first stored message algorithm information can be found in the encrypted third message, the connection/attach session is terminated, unless insecure negotiation is allowed.
27. A switching serving node according to claim 26, c h a r a c t e r i z e d i n that it comprises a packet data node, e.g. an SGSN or a CGSN and in that said interface is the Gb interface.
28. A switching serving node according to claim 27, c h a r a c t e r i z e d i n that the information protection algorithms comprise encryption algorithms with e.g. 64-128 bit keys and/or integrity algorithms and protection codes comprising integrity algorithms.
29. A switching serving node according to claim 27, c h a r a c t e r i z e d i n that the information protection algorithms comprise encryption algorithms with e.g. 64-128 bit keys and protection codes comprising cipher block codes.
30. A method for enabling secure negotiation of information protection algorithms between a user station and a switching serving node over a radio access network in a communication system, wherein the user station supports a first set of information protection algorithms and the switching serving node supports a second set of information protection algorithms, c h a r a c t e r i z e d i n that it comprises the steps of: sending a first message with a request for connection/ attach to the switching serving node from the user station, said first message comprising information about the first set of information protection algorithms, storing the information in the first message in the switching serving node, selecting information protection algorithms common to the first and second set according to a given policy in the switching serving node, returning a second message from the switching serving node to the user station comprising the selected algorithms and a challenge/authentication and ciphering request, calculating a response and a number of keys based on the content of the second message in the user station, encrypting in the user station at least the first message using a selected information protection code and a calculated key to provide a third message, sending the third message to the switching serving node, decrypting the third message in the switching serving node using the selected information protection algorithm (and the key used for encryption) , comparing the third message with the information on algorithms in the first message stored in the switching serving node, proceeding with the connection/attach procedure unless the comparison results in a non-correspondence, or if insecure negotiation is accepted.
31. A method according to claim 30, c h a r a c t e r i z e d i n that it comprises the step of: indicating in the user station whether insecure negotiation is allowed or not.
32. A method according to claim 31, c h a r a c t e r i z e d i n that the information protection algorithms comprise encryption algorithms and/or integrity algorithms, and protection codes, one of which protection codes being selected for encryption/decryption purposes.
33. A method according to claim 32, c h a r a c t e r i z e d i n that the protection codes comprise integrity algorithms.
34. A method according to claim 32, c h a r a c t e r i z e d i n that the protection codes comprises cipher block codes.
35. A method according to any one of claims 30-34, c h a r a c t e r i z e d i n that the switching serving node comprises a SGSN or a CGSN node in a GPRS/UMTS system and in that the interface is the Gb interface.
36. A method according to any one of claims 34, c h a r a c t e r i z e d i n that the switching serving node is an MSC and in that the interface is the A-interface.
PCT/EP2003/004350 2003-04-25 2003-04-25 An arrangement and a method relating to secure communication WO2004098144A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/EP2003/004350 WO2004098144A1 (en) 2003-04-25 2003-04-25 An arrangement and a method relating to secure communication
AU2003242524A AU2003242524A1 (en) 2003-04-25 2003-04-25 An arrangement and a method relating to secure communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2003/004350 WO2004098144A1 (en) 2003-04-25 2003-04-25 An arrangement and a method relating to secure communication

Publications (1)

Publication Number Publication Date
WO2004098144A1 true WO2004098144A1 (en) 2004-11-11

Family

ID=33395681

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2003/004350 WO2004098144A1 (en) 2003-04-25 2003-04-25 An arrangement and a method relating to secure communication

Country Status (2)

Country Link
AU (1) AU2003242524A1 (en)
WO (1) WO2004098144A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006081712A1 (en) * 2005-02-07 2006-08-10 Zte Corporation A method for switching the level of the plaintext and cyphertext during the conversation
WO2006134505A1 (en) * 2005-06-17 2006-12-21 Nokia Corporation Method, system and network elements for establishing media protection over networks
EP1870308A2 (en) * 2006-06-23 2007-12-26 Siemens Aktiengesellschaft Method for data transfer
WO2010027314A1 (en) * 2008-09-05 2010-03-11 Telefonaktiebolaget L M Ericsson (Publ) Secure negotiation of authentication capabilities
WO2010135292A2 (en) * 2009-05-22 2010-11-25 Microsoft Corporation Model based multi-tier authentication
EP2371155A1 (en) * 2008-11-26 2011-10-05 Alcatel-Lucent USA Inc. Prevention of a bidding-down attack in a communication system
EP2484137A4 (en) * 2009-09-28 2014-12-31 Unwired Planet Internat Ltd Security feature negotiation between network and user terminal
EP1864427A4 (en) * 2005-03-17 2016-04-20 Korea Electronics Telecomm Method for negotiating security-related functions of subscriber station in wireless portable internet system
WO2017031420A1 (en) * 2015-08-20 2017-02-23 Alibaba Group Holding Limited Method, apparatus, terminal device and system for generating shared key
JP2018526905A (en) * 2015-08-13 2018-09-13 ホアウェイ・テクノロジーズ・カンパニー・リミテッド Message protection method, and related devices and systems

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5371794A (en) * 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
EP1005244A1 (en) * 1998-11-25 2000-05-31 ICO Services Ltd. Connection authentication in a mobile network
DE10025271A1 (en) * 2000-05-22 2001-11-29 Siemens Ag Method for establishing a connection between a terminal and a serving cellular network, cellular network and terminal therefor
US20020066011A1 (en) * 2000-11-28 2002-05-30 Nokia Corporation System for ensuring encrypted communication after handover

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5371794A (en) * 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
EP1005244A1 (en) * 1998-11-25 2000-05-31 ICO Services Ltd. Connection authentication in a mobile network
DE10025271A1 (en) * 2000-05-22 2001-11-29 Siemens Ag Method for establishing a connection between a terminal and a serving cellular network, cellular network and terminal therefor
US20020066011A1 (en) * 2000-11-28 2002-05-30 Nokia Corporation System for ensuring encrypted communication after handover

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006081712A1 (en) * 2005-02-07 2006-08-10 Zte Corporation A method for switching the level of the plaintext and cyphertext during the conversation
EP1864427A4 (en) * 2005-03-17 2016-04-20 Korea Electronics Telecomm Method for negotiating security-related functions of subscriber station in wireless portable internet system
WO2006134505A1 (en) * 2005-06-17 2006-12-21 Nokia Corporation Method, system and network elements for establishing media protection over networks
EP1870308A2 (en) * 2006-06-23 2007-12-26 Siemens Aktiengesellschaft Method for data transfer
DE102006028938B3 (en) * 2006-06-23 2008-02-07 Siemens Ag Method for transmitting data
EP1870308A3 (en) * 2006-06-23 2009-11-04 Siemens Aktiengesellschaft Method for data transfer
JP2012502548A (en) * 2008-09-05 2012-01-26 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Secure negotiation of authentication capabilities
WO2010027314A1 (en) * 2008-09-05 2010-03-11 Telefonaktiebolaget L M Ericsson (Publ) Secure negotiation of authentication capabilities
US9668139B2 (en) 2008-09-05 2017-05-30 Telefonaktiebolaget Lm Ericsson (Publ) Secure negotiation of authentication capabilities
JP2012510232A (en) * 2008-11-26 2012-04-26 アルカテル−ルーセント ユーエスエー インコーポレーテッド Prevention of bid-off attacks in communication systems
EP2371155A1 (en) * 2008-11-26 2011-10-05 Alcatel-Lucent USA Inc. Prevention of a bidding-down attack in a communication system
WO2010135292A2 (en) * 2009-05-22 2010-11-25 Microsoft Corporation Model based multi-tier authentication
CN102439898A (en) * 2009-05-22 2012-05-02 微软公司 Model based multi-tier authentication
AU2010249698B2 (en) * 2009-05-22 2014-10-30 Microsoft Technology Licensing, Llc Model based multi-tier authentication
WO2010135292A3 (en) * 2009-05-22 2011-02-03 Microsoft Corporation Model based multi-tier authentication
US9544147B2 (en) 2009-05-22 2017-01-10 Microsoft Technology Licensing, Llc Model based multi-tier authentication
EP2484137A4 (en) * 2009-09-28 2014-12-31 Unwired Planet Internat Ltd Security feature negotiation between network and user terminal
JP2018526905A (en) * 2015-08-13 2018-09-13 ホアウェイ・テクノロジーズ・カンパニー・リミテッド Message protection method, and related devices and systems
WO2017031420A1 (en) * 2015-08-20 2017-02-23 Alibaba Group Holding Limited Method, apparatus, terminal device and system for generating shared key
US10050781B2 (en) 2015-08-20 2018-08-14 Alibaba Group Holding Limited Method, apparatus, terminal device and system for generating shared key
CN106470104A (en) * 2015-08-20 2017-03-01 阿里巴巴集团控股有限公司 For generating method, device, terminal unit and the system of shared key
CN106470104B (en) * 2015-08-20 2020-02-07 阿里巴巴集团控股有限公司 Method, device, terminal equipment and system for generating shared key
TWI710244B (en) * 2015-08-20 2020-11-11 香港商阿里巴巴集團服務有限公司 Method, device, terminal equipment and system for generating shared key

Also Published As

Publication number Publication date
AU2003242524A1 (en) 2004-11-23

Similar Documents

Publication Publication Date Title
CN110945886B (en) Method and system for detecting anti-steering of roaming activity in wireless communication network
JP4688808B2 (en) Enhanced security configuration for encryption in mobile communication systems
US8260259B2 (en) Mutual authentication with modified message authentication code
CN102318386B (en) To the certification based on service of network
EP1338169B1 (en) Method and apparatus to counter the rogue shell threat by means of local key derivation
EP1758417B1 (en) Authentication method
US9668139B2 (en) Secure negotiation of authentication capabilities
KR100755394B1 (en) Method for fast re-authentication in umts for umts-wlan handover
US20110004754A1 (en) Method And Apparatuses For Authentication And Reauthentication Of A User With First And Second Authentication Procedures
US11159940B2 (en) Method for mutual authentication between user equipment and a communication network
KR20070112260A (en) Network assisted terminal to sim/uicc key establishment
WO2004098144A1 (en) An arrangement and a method relating to secure communication
US8457313B2 (en) Protocol expansion of a signaling message
US20230108626A1 (en) Ue challenge to a network before authentication procedure
EP1238554A1 (en) Communication method
Blanchard et al. Wireless security
WO2006050663A1 (en) Method of setting security key
Bluszcz UMTS Security UMTS Security
WP Project Title USECA: UMTS Security Architecture

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP