UMTS security:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Chichester [u.a.]
Wiley
2003
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 273 S. graph. Darst. |
ISBN: | 0470847948 047085314X |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV017017995 | ||
003 | DE-604 | ||
005 | 20080514 | ||
007 | t | ||
008 | 030325s2003 d||| |||| 00||| eng d | ||
016 | 7 | |a 966634934 |2 DE-101 | |
020 | |a 0470847948 |9 0-470-84794-8 | ||
020 | |a 047085314X |9 0-470-85314-X | ||
035 | |a (OCoLC)249118899 | ||
035 | |a (DE-599)BVBBV017017995 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-739 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ZN 6550 |0 (DE-625)157571: |2 rvk | ||
084 | |a ZN 6560 |0 (DE-625)157572: |2 rvk | ||
100 | 1 | |a Niemi, Valtteri |e Verfasser |4 aut | |
245 | 1 | 0 | |a UMTS security |c Valtteri Niemi ; Kaisa Nyberg |
264 | 1 | |a Chichester [u.a.] |b Wiley |c 2003 | |
300 | |a XII, 273 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a UMTS |0 (DE-588)4563298-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a UMTS |0 (DE-588)4563298-4 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Nyberg, Kaisa |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010271649&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-010271649 |
Datensatz im Suchindex
_version_ | 1804129921872691200 |
---|---|
adam_text | Contents
Preface
xi
PART I: SECURITY ARCHITECTURE FOR UMTS
1
1
Introduction to Security and to UMTS
3
1.1
Security in Telecommunications
3
1.1.1
General security principles
4
1.1.2
GSM security
7
1.2
The Background to 3G
11
1.3
The 3G Partnership Project (3GPP)
12
1.4
3GPP Network Architecture
14
1.4.1
Elements in the architecture
15
1.4.2
Protocols in the 3GPP system
18
1.5
WCDMA Radio Technology
20
1.5.1
CDMA: an example
22
1.5.2
Basic facts of WCDMA
23
1.5.3
Handovers
25
1.5.4
Power control
25
2
UMTS Security Features in Release
1999 29
2.1
Access Security to UMTS
29
2.1.1
Mutual authentication
30
2.1.2
Temporary identities
42
2.1.3
UTRAN encryption
44
2.1.4
Integrity protection of RRC signalling
54
2.1.5
Set-up of UTRAN security mechanisms
59
2.1.6
Summary of access security in the CS and PS domains
63
2.2
Interworking with GSM
63
2.2.1
Interworking scenarios
65
2.2.2
Cases
with SIM
2.2.3
Cases
with USIM
2.2.4
Handovers from one system to another
2.3
Additional Security Features in Release
1999
2.3.1
Ciphering indicator
2.3.2
Identification of the UE
2.3.3
Security for Location Services (LCs)
2.3.4
User-to-USIM authentication
2.3.5
Security in the USIM application toolkit
2.3.6
Mobile Execution Environment (MExE)
2.3.7
Lawful interception
Security Features in Releases
4
and
5 73
3.1
Network Domain Security
73
3.1.1
MAPsec
74
3.1.2
IPsec
81
3.1.3
IPsec-based mechanisms in UMTS
84
3.1.4
Role of firewalls
86
3.2
IMS Security
87
3.2.1
Basics of SIP
87
3.2.2
IMS architecture
90
3.2.3
Architecture for securing access to the IMS
91
3.2.4
Principles for IMS access security
93
3.2.5
Use of HTTP Digest AKA
95
3.2.6
Security mode set-up
100
3.2.7
Integrity protection with ESP
101
3.2.8
Error case handling
104
3.3
Other Security Systems
106
3.3.1
Higher layer security systems
106
3.3.2
Link layer security systems
108
PART II: CRYPTOGRAPHIC ALGORITHMS 111
4
Introduction to Cryptography
113
4.1
The Science of Cryptology
113
4.1.1
Cryptographic systems
113
4.1.2
Security and vulnerability
115
4.1.3
Developing cryptology into a publicly available science
116
4.1.4
Public cryptographic development efforts
118
4.2
Requirements and Analysis of Cryptographic Algorithms
119
4.2.1
Block ciphers
120
4.2.2
Stream ciphers
125
4.2.3
Message authentication codes
127
5
3GPP Algorithm Specification Principles
131
6
Confidentiality and Integrity Algorithms
135
6.1
Requirements for the Confidentiality Algorithm
135
6.1.1
Functional requirements
135
6.1.2
Algorithm operation
136
6.1.3
Interfaces to the algorithm
137
6.2
Requirements for the Integrity Algorithm
139
6.2.1
Overview
139
6.2.2
Interface
140
6.3
Design Task Force
142
6.4
Getting Started
142
6.4.1
SAGE contribution to SA3
143
6.4.2
Modes around MISTY1
143
6.4.3
Particular security criteria
144
6.5
Design Process
144
6.5.1
The teams
145
6.5.2
Design documentation
145
6.5.3
Conclusion of evaluation
148
6.6
Confidentiality Algorithm
149
6.6.1
The f8 stream cipher mode
149
6.6.2
Description of f8
149
6.6.3
Security
151
6.7
Extension of the UMTS Confidentiality Algorithm
152
6.7.1
Background
152
6.7.2
List of variables
153
6.7.3
Core function KGCORE
154
6.7.4
A5/3 algorithm for GSM encryption
157
6.7.5
A5/3 algorithm for ECSD encryption
158
6.7.6
GEA3 algorithm for GPRS encryption
160
6.7.7
Specification of the 3GPP confidentiality algorithm f8
161
6.7.8
Summary of the confidentiality functions
162
6.8
Integrity Algorithm
163
6.8.1
The f9 MAC mode
163
6.8.2
Description
164
6.8.3
Security
165
6.9
Implementation
168
6.9.1
Length of data
168
6.10
IPR Issues and Exportability
169
6.10.1
IPR issues
169
6.10.2
Exportability
169
7
Kernel Algorithm KASUMI
171
7.1
Introduction
171
7.2
MISTY Block Cipher Algorithms
172
7.2.1
Design principles of MISTY
1 172
7.2.2
Security of MISTY
176
7.3
Changes between MISTY1 and KASUMI
178
7.3.1
Changes to the data encryption part
178
7.3.2
Changes to the key-scheduling part
179
7.4
Description of KASUMI
179
7.4.1
General structure
179
7.4.2
KASUMI encryption function
181
7.4.3
Key schedule
187
7.5
Mathematical Analysis of KASUMI by the Task Force
188
7.5.1
Properties of components
188
7.5.2
Differential cryptanalysis
192
7.5.3
Truncated differentials
195
7.5.4
Linear cryptanalysis
196
7.5.5
Higher order differential attacks
196
7.6
Public Research on KASUMI
197
7.7
Implementation issues
198
7.7.1
Parallel operation
198
7.7.2
Implementation attacks
199
Authentication and Key Generation Algorithm
201
8.1
Design Task Force
201
8.2
Requirements
202
8.2.1
Authentication specification
202
8.2.2
Functional requirements for UMTS authentication
205
8.2.3
General requirements
209
8.2.4
Additional requirements from
S
A3 209
8.3
Design Process
210
8.3.1
Work plan
210
8.3.2
SAGE s contribution to the UMTS security architecture
212
8.3.3
Cryptographic requirements
213
8.3.4
Operator-variant algorithm configuration field
214
8.3.5
Criteria for the cryptographic kernel
214
Contents ix
8.4
Description
of the Modes
216
8.4.1
The algorithm framework
216
8.4.2
Notation
216
8.4.3
Specification of the modes
217
8.5
The MILENAGE Architecture
219
8.5.1
Use of OP
220
8.5.2
Rotation and offset constants
220
8.5.3
Protection against side-channel attacks
220
8.5.4
The number of kernel operations
220
8.5.5
Modes of operation
221
8.6
Kernel Algorithm
221
8.6.1
Block ciphers versus hash functions
221
8.6.2
The kernel of MILENAGE
223
8.7
Customization Options
224
8.7.1
Operator variant parameter
224
8.7.2
Kernel algorithm
225
8.7.3
Rotation and offset parameters
225
8.7.4
Length of RES
226
8.8
Conversion to and Compatibility with A3/A8
226
8.8.1
Conversion rules
227
8.8.2
GSM-MILENAGE
228
8.9
Security analysis of MILENAGE
230
8.9.1
Assumptions and security claims
230
8.9.2
Operational context
231
8.9.3
The soundness of the f2-f5* construction
232
8.9.4
Soundness of the fl-fl* construction and its
cryptographic separation from the other modes
234
8.9.5
Investigation of forgery or distinguishing attacks with
264 queries
236
8.9.6
Conclusions
240
Notation of Parameters, Sets and Functions
243
Abbreviations
249
References
257
Index
267
|
any_adam_object | 1 |
author | Niemi, Valtteri Nyberg, Kaisa |
author_facet | Niemi, Valtteri Nyberg, Kaisa |
author_role | aut aut |
author_sort | Niemi, Valtteri |
author_variant | v n vn k n kn |
building | Verbundindex |
bvnumber | BV017017995 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 ZN 6550 ZN 6560 |
ctrlnum | (OCoLC)249118899 (DE-599)BVBBV017017995 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01508nam a2200421 c 4500</leader><controlfield tag="001">BV017017995</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080514 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030325s2003 d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">966634934</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470847948</subfield><subfield code="9">0-470-84794-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">047085314X</subfield><subfield code="9">0-470-85314-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)249118899</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017017995</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6550</subfield><subfield code="0">(DE-625)157571:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6560</subfield><subfield code="0">(DE-625)157572:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Niemi, Valtteri</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">UMTS security</subfield><subfield code="c">Valtteri Niemi ; Kaisa Nyberg</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester [u.a.]</subfield><subfield code="b">Wiley</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 273 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">UMTS</subfield><subfield code="0">(DE-588)4563298-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">UMTS</subfield><subfield code="0">(DE-588)4563298-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nyberg, Kaisa</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010271649&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010271649</subfield></datafield></record></collection> |
id | DE-604.BV017017995 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:12:49Z |
institution | BVB |
isbn | 0470847948 047085314X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010271649 |
oclc_num | 249118899 |
open_access_boolean | |
owner | DE-703 DE-739 |
owner_facet | DE-703 DE-739 |
physical | XII, 273 S. graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Wiley |
record_format | marc |
spelling | Niemi, Valtteri Verfasser aut UMTS security Valtteri Niemi ; Kaisa Nyberg Chichester [u.a.] Wiley 2003 XII, 273 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Datensicherung (DE-588)4011144-1 gnd rswk-swf UMTS (DE-588)4563298-4 gnd rswk-swf UMTS (DE-588)4563298-4 s Datensicherung (DE-588)4011144-1 s DE-604 Nyberg, Kaisa Verfasser aut Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010271649&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Niemi, Valtteri Nyberg, Kaisa UMTS security Datensicherung (DE-588)4011144-1 gnd UMTS (DE-588)4563298-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4563298-4 |
title | UMTS security |
title_auth | UMTS security |
title_exact_search | UMTS security |
title_full | UMTS security Valtteri Niemi ; Kaisa Nyberg |
title_fullStr | UMTS security Valtteri Niemi ; Kaisa Nyberg |
title_full_unstemmed | UMTS security Valtteri Niemi ; Kaisa Nyberg |
title_short | UMTS security |
title_sort | umts security |
topic | Datensicherung (DE-588)4011144-1 gnd UMTS (DE-588)4563298-4 gnd |
topic_facet | Datensicherung UMTS |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010271649&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT niemivaltteri umtssecurity AT nybergkaisa umtssecurity |