Page 63 - From GMS to LTE
P. 63

Global System for Mobile Communications (GSM)  49

                 A5/1 Passive attacks. Researchers have practically demonstrated that passive attacks
               ●
                on A5/1 are possible under the following conditions:
                    – A correctly received data stream can be recorded.
                    – Empty bits in GSM signaling frames (fillbits) are sent with a repeating bit pattern.
                    – A precomputed decryption table with a size of around 4 TB is available.
                While computing and storing the decryption table posed an insurmountable chal-
               lenge even for specialized equipment at the time A5/1 was conceived, it has now become
               possible to compute the table in a reasonable amount of time and to store the result.
               The required hardware and open‐source software are now easily available at low cost,
               and a practical real‐time exploit has been demonstrated during the 28th CCC Congress
               in December 2011 [28].
                This threat can be countered by using the A5/3 encryption algorithm for communica-
               tion, which at the time of writing is considered to be secure. Today, A5/3 is supported
               by most new devices appearing in the market but only by a few networks. Further, the
               mobile device must not support A5/2, to deny an attacker the possibility of calculating
               the key later on as described above. Another method to protect communication against
               a passive A5/1 attack is to randomize the fillbits in GSM signaling frames in both the
               uplink and the downlink directions. This was standardized a number of years ago in
               3GPP TS 44.008, Section 5.2. In practice, it can be observed that some devices and
               networks randomize the fillbits today, but widespread acceptance has still not been
               reached.
                At this point, it is worth noting that the efforts described above were targeted at the
               ciphering key Kc. No practical methods are known that do not require physical access
               to the SIM card to break the authentication and key‐generation algorithms A3 and A8
               to get to the shared secret key Ki. This means that should an attacker get the ciphering
               key Kc of a user, they would still not be able to authenticate during the next network
               challenge. This means that if the network requires authentication and ciphering for
               each communication session, it is not possible for an attacker to impersonate another
               subscriber to receive calls or SMS messages in their place or to make outgoing calls.

               1.7.8  Modulation

               At the end of the transmission chain, the modulator maps the digital data onto an analog
               carrier, which uses a bandwidth of 200 kHz. This mapping is done by encoding the bits
               into changes of the carrier frequency. As the frequency change takes a finite amount of
               time, a method called Gaussian minimum shift keying (GMSK) is used, which smooths
               the flanks created by the frequency changes. GMSK has been selected for GSM as its
               modulation and demodulation properties are easy to handle and implement into hard-
               ware and as it interferes only slightly with neighboring channels.


               1.7.9  Voice Activity Detection
               To reduce the interference on the air interface and to increase the operating time of the
               mobile device, data bursts are only sent if a speech signal is detected. This method is
               called discontinuous transmission (DTX) and can be activated independently in
               the uplink and downlink directions (Figure 1.40). Since only one person speaks at a time
               during a conversation, one of the two speech channels can usually be deactivated. In the
   58   59   60   61   62   63   64   65   66   67   68