Page 190 - From GMS to LTE
P. 190

176  From GSM to LTE-Advanced Pro and 5G

            register with the network by initiating location and routing area update procedures. At
            the beginning of the message exchange the mobile device transmits its identity (IMSI or
            TMSI and PTMSI), which it retrieves from the SIM. If the subscriber is not known by
            the MSC/VLR and/or the SGSN, authentication information has to be requested from
            the authentication center, which is part of the HLR. In addition to the random number
            (RAND), the expected response (XRES) and the CK, which are also used in GSM, two
            additional values are returned. These are the integrity key (IK) and the authentication
            token (AUTN). Together, these five values form an authentication vector.
             The AUTN serves two purposes. The AuC generates the AUTN from a RAND and
            the secret key of the subscriber. It is then forwarded together with the RAND to the
            mobile device in an MM Authentication Request message. The mobile device then uses
            the AUTN to verify that the authentication procedure was initiated by an authorized
            network. The AUTN additionally includes a sequence number, which is increased in
            both the network and the mobile device after every successful authentication. This pre-
            vents attackers from using intercepted authentication vectors for fake authentications
            later on.
             Like in GSM, a UMTS device has to generate a response value, which it returns to
            the network in the MM Authentication Response message. The MSC/VLR or SGSN
            then compares the response value to the XRES value, which it received as part of the
            authentication vector from the HLR/AuC. If both values match, the subscriber is
            authenticated.
             In a further step, ciphering between the mobile device and the network is activated
            when the network sends a RANAP Security Mode Command message to the RNC. This
            message contains the 128‐bit CK. While in GSM, ciphering for circuit‐switched calls is
            a function of the base station, UMTS calls are ciphered by the RNC. This prevents
            eavesdropping on the Iub interface between the RNC and the base station. An RRC
            Security Mode Command message informs the mobile device that ciphering is to be
            activated. Like in GSM, the CK is not sent to the mobile as this would compromise
            security. Instead, the mobile calculates the CK itself by using, among other values, its
            secret key and the RAND.
             Security  mode  command  messages  activate  not  only  ciphering  but  also  integrity
            checking for signaling messages, which was not performed in GSM. While ciphering is
            optional, it is mandatory for integrity checking to be activated after authentication.
            Integrity checking is performed for RRC, CC, SM, MM and GMM messages between
            the mobile device and the network. User data, on the other hand, has to be verified by
            the application layer, if required. To allow the receiver to check the validity of a message,
            an integrity stamp field is added to the signaling messages. The most important param-
            eters for the RNC to calculate the stamp are the content of the signaling message and
            the IK, which is part of the authentication vector. Integrity checking is done for both
            uplink and downlink signaling messages. To perform integrity checking for incoming
            messages and to be able to append the stamp for outgoing messages, the mobile device
            calculates the IK itself after the authentication procedure. The calculation of the key is
            performed by the SIM card, using the secret key and the RAND which were part of the
            Authentication Request message. This way, the IK is also never exchanged between the
            mobile device and the network.
             Keys for ciphering and integrity checking have a limited lifetime to prevent attempts
            to break the cipher or integrity protection by brute force during long‐duration
   185   186   187   188   189   190   191   192   193   194   195