GSM Security and Authentication

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 14

GSM Security and Authentication

1. Introduction

Global System for Mobile Communication (GSM) is a digital second generation

(2G) cellular communication system, initiated by Europeans and widely used all

over the world. GSM together with other modern communication technologies

provide a range of services which include voice and video calling service, short

messaging service (SMS), multimedia messaging service (MMS), call divert, call

waiting, call forwarding, and call baring services, circuit-switched data (HCSD),

packet-switched data (GPRS), enhanced GSM (EDGE) and Universal Mobile

Telecommunications Service (UMTS). More than 2 billion people around the

world use GSM for different purposes. Most of them use this system for calling

and messaging but some also use the system for internet and mobile TV.

Cellular communication systems make use of microwave radio links. The security

and authentication of the services provided under these kinds of systems is an

important issue to discuss. The first generation cellular communication systems,

like NMT, TACS and AMPS, were less secure. This resulted in significant levels

of fraudulent activities. These kinds of activities did great damage to the

subscribers as well as the network operators [1]. There was a need to authenticate

users of the system so that the resources would not be misused by nonsubscribers

[2]. This was also realized that these systems need implementation of higher level

of security protocols than the traditional fixed line phones, which offer some

secure communications because the hacker need to have physical access to the

subscriber’s line. Therefore, to protect the system against such kinds of threats,

1
several possible measures were taken. Hence, a new mobile communication

system, so called GSM, came into existence. The objective behind GSM was to

provide a secure and authenticated communication services to the mobile phone

subscribers, and make an efficient use of the electromagnetic radio spectrum.

For GSM, like many other widely used communication systems, security is

crucial. The security involves mechanisms used to protect different shareholders,

like subscribers and service providers [3]. This essay discusses the security

features of GSM. Different aspects of GSM security are taken into consideration

like subscriber authentication, data encryption, privacy, and user identity.

2. Encryption and Security in GSM

GSM incorporates certain security features that prevent (1) unauthorized use of

the network as it maintains the identity and authentication key of the subscriber on

the subscriber’s identity module (SIM), and (2) over-the-air interfacing through

ciphering of the user and signaling data. Subscriber’s identity (IMSI) is further

protected by a temporary number, so called the Temporary Mobile Subscriber

Identity (TMSI) number [4]. The TMSI number is much smaller in length than the

IMSI number. This is temporary because it keeps on changing from call to call.

Hence, it frees up some signaling space on the spectrum, and there is no need to

on-air the original IMSI, therefore ensuring the confidentiality of the subscriber’s

data and location. References [1-2] and [4-6] provide relevant GSM specifications

and other discussions on security, authentication and encryption. The architecture

of GSM is best understood by the following Figure 2.1 [2].

2
Figure 2.1: GSM Architecture

There are four basic security services provided by GSM [2]:

1) Anonymity: TMSI assignment;


2) Authentication;
3) Encryption of user voice and signaling data over the radio link: minimizes
eavesdropping;
4) Subscriber’s Identity Module (SIM) and Mobile Equipment Identity
(IMEI) number.

2.1. Anonymity

Any subscriber of a mobile network is identified by a unique and permanently

attached identifier to the subscriber, called an IMSI. This IMSI has to be

protected over the air interface. GSM does this by making use of a technique,

so called Anonymity. In this technique, the mobile subscriber is temporarily

assigned an ID that is known as TMSI. The TMSI is used instead of IMSI

whenever the system wants to address the subscriber. Both the permanent and

temporary IDs are stored in the SIM. When a mobile phone first switch on in

a new Mobile Switching Center (MSC) or Visitor Location Register (VLR)

area, the real identity (IMSI) is used and a temporary identification (TMSI) is

3
issued. From then on the TMSI is used for all communication between mobile

and the system. [2]

Figure 2.2: TMSI assignment process as a result of location updates [2].

The subscriber identity confidentiality procedure for the protection of IMSI is

described in the Figure 2.2. Anonymity is the procedure of keeping the IMSI

confidential from the unauthorized individuals or entities. This feature

protects user’s identity from being stolen or hacked, hence, ensuring a high

degree of privacy to the user. This feature also provides better security to the

GSM network operators as they can easily identify the users present on the

network, resulting in correct billing of the phone calls and other services.

2.2. Authentication

The authentication feature ensures to a very high level of probability that the

user is who they claim to be [2]. This feature protects the GSM network from

4
any unauthorized or misuse. The subscriber authentication is performed at

every call attempt, location update, and every time when the mobile set is

switched on and off.

Authentication uses a technique that can be described as a Challenge and

Response technique [2]. A simple representation of authentication is shown in

Figure 2.3.

Figure 2.3: Authentication process [2].

The Challenge and Response authentication technique makes use of an

algorithm named A3. The generic process of GSM authentication is described

in Figure 2.4.

Figure 2.4: Generic GSM Authentication Process [2].

5
The A3 algorithm computes the response of the network and the mobile

subscriber unit, at the same time, by using the secret key of the mobile

subscriber and a random key generated by the Authentication Center (AuC)

of GSM network. This random number is made available to the mobile

subscriber unit via network to compute the response. The authentication

process is carried out at the MSC and the mobile, simultaneously. The

responses are then compared and access to the network is granted if both are

same. Only the random number and the mobile subscriber response (SRES)

are transmitted over the radio interface between the MSC and the mobile.

Hence the secret key is not disclosed to anyone. This secret key is issued to

the subscriber at the time of first registration, and is stored in the SIM and the

AuC. The AuC uses this secret key to identify the user as well as to generate

some keys and numbers based on that secret key to use for further

authentication processing. Another algorithm called A8 is used in further

authentication process to generate the cipher key.

The AuC begins authentication and cipher key generation procedures after

receiving the subscriber’s identification information from the location

registers (HLR/VLR). The AuC first queries the HLR for the subscriber’s

authentication key, Ki. It then generates a 128-bit RAND for use as a

challenge to be sent to the mobile set for verification of the mobile set

authenticity. RAND is also used by the AuC, with Ki in the algorithm A3 for

authentication, to calculate the expected correct response, SRES, from the

mobile subscriber unit. RAND and Ki are also used in the AuC to calculate

6
the Kc with algorithm A8. SRES is a 32-bit number, and Kc is a 64-bit

number. [2]

The complete procedure for user authentication in a GSM system is best

described in Figure 2.5.

Figure 2.5: Complete authentication procedure in GSM [2].

2.3. Encryption

This feature ensures the privacy and confidentiality of the information, either

voice or message, of the subscriber as well as the user-related signaling

information. Everything is ciphered and all other information is protected.

Encryption of data is must against eavesdropping. This can be achieved using

the following process. The network generates a random number and sends to

7
the mobile. The mobile uses that random number along with its secret key to

encrypt the plain text. The plain text is then transformed into a ciphered text.

In this process, series of bits are transformed by mathematical or logical

functions into another series of bits which are encrypted bits then. The

encryption process is illustrated in Figure 2.6 [2], where the input is the Plain

text and the output is Cipher text.

Figure 2.6: Encryption process.

The confidentiality of the information elements carried on the radio path

(signaling and user data) is ensured by systematic encryption. The

ciphering/deciphering algorithm (called A5) uses a cipher key Kc that is

generated during the authentication procedures. Kc is computed from the

RAND by an algorithm (called A8) driven by Ki. Figure 2.5 shows the

process of generating the cipher key Kc. The sequential steps for encryption

and decryption process are shown in Figures 2.7 and 2.8 [2].

8
Figure 2.7: Illustration of encryption and decryption process.

The algorithms are applied before the data is sent over the radio link. The user

as well as signaling data is protected by manipulating the 114 radio bits that

fill each normal burst in a TDMA frame. A reverse manipulation is performed

in the receiver immediately after the data stream is recovered in the receiver.

Ciphering/deciphering keys have to be generated for each TDMA frame by a

stream cipher algorithm. A stream cipher algorithm with so-called linear

feedback shift registers (LFSRs) is used in GSM. The A5 is first fed with the

64-bit cipher key Kc (for initialization) and the current 22-bit TDMA frame

number. Note that Kc may actually contain less than 64 bits of significance;

64 significant bits implies maximum security. [4]

9
Figure 2.8: GSM encryption process.

A short (not-so-secure) Kc is accompanied by enough zeros in order to fill all

64 bits of the A5 register. Because the output is also a function of the current

TDMA frame number, the output of the clocked A5 shift registers, the

ciphering keys, is different for each TDMA frame and has two different

uplink and downlink cipher sequences of 114 bits each. Finally, the data is

XOR with the cipher keys in order to have enciphered data. To recover the

transmitted enciphered data, the receiver needs to use the same cipher key for

decryption (XOR with received radio bits) that was used by the transmitter

for encryption. [4]

10
2.4. SIM and IMEI

The identity of the subscriber (IMSI) and the authentication key is stored in

the SIM. The IMEI is the mobile equipment identification number which is

used to identify the mobile equipment being used over the network. Both of

these assure that no stolen or unauthorized user and mobile equipment is used

in the system.

3. Conclusion

The objective of this essay is to clearly outline the security features adopted in

GSM. The older mobile communication systems, like NMT, TACS, and AMPS,

showed that improper authentication mechanisms result in impersonate

subscribers. This did a great financial damage to the network operators as there

was no billing information with the operator. GSM is the first secure mobile

communication system. The evolution of GSM rectified this problem as certain

authentication algorithms were used for subscriber identity and correct billing.

The GSM facilitates both the subscriber and the network operator by providing

them a variety of services and security features to ensure their protection against

many fraudulent and deceitful activities, as well as unauthorized use of the

services.

GSM authentication architecture ensures that the network is accessed by the

genuine subscribers only. The radio link is ciphered in order to protect

subscriber’s calling information from being stolen or hacked. The subscriber’s

connection and data is encrypted in such a way that there is no eavesdropping.

The details and the location of the subscriber are protected, and full privacy is

11
ensured to the users of the system. This is done by using different ciphering

algorithms, as described in the essay. The use of enciphering is one of several

important contributions of GSM. To protect the location address of the system

user and to understate eavesdropping, instead of user’s IMSI, a temporary

subscriber identity (TMSI) number is assigned to each active user on the system

which keeps changing from call to call.

In short, the GSM is a reasonably secure mobile communication system. The

development in the architecture of GSM and further enhancement in the

communication technologies, like the development of UMTS introduced more

secure mobile communications because of the fact that it uses a longer

authentication key, making it more and more difficult to break the cipher

algorithms.

References and Bibliography

[1] Raymond Steele, Chin-Chun Lee, Peter Gould. (2001). GSM, cdmaOne and

3G Systems. pp. 145-148. England: John Wiley & Sons, Inc. (0471491853)

[2] Asha Mehrotra. (1997). GSM System Engineering. pp. 151-167. Boston-

London: Artech House, Inc. (0890068607)

[3] Paul Yousef. (2004, Mar. 5). GSM Security: a Survey and Evaluation of the

Current Situation. Master’s Thesis: Linkoping Institute of Technology.

Retrieved December 9, 2007, from Linkoping University Electronic Press

Web site: http://www.ep.liu.se/abstract.xsql?dbid=2273

12
[4] Siegmund M. Redl, Matthias K. Weber, Malcolm W. Oliphant. (1998). GSM

and Personal Communications Handbook. pp. 459-462. Boston-London:

Artech House, Inc. (0890069573)

[5] Rejis J. Bates. (2002). Broadband Telecommunications Handbook. 2nd edition,

pp. 30-33. McGraw-Hill Publishing Corporation. (0071398511)

[6] K. Daniel Wong. (2005). Wireless Internet Telecommunications. pp. 143-161.

Boston-London: Artech House, Inc. (1580537111)

[7] (2007, Dec. 9). GSM-Security.net: Your Portal to the World of GSM Security.

Retrieved December 9, 2007, from GSM-Security Web site: http://www.gsm-

security.net/

[8] Jeremy Quirke. (2004, May 1). Security in the GSM System. (AusMobile

Paper). Retrieved December 9, 2007, from Google Search Engine Web site:

http://www.csd.uoc.gr/~hy457/papers/Security_in_the_GSM_system.pdf

[9] Mikko Suominen. (2003, April 15). GSM Security. Lecture slides: S-38.153

Security of Communication Protocols, University of Helsinki, Finland.

Retrieved December 9, 2007, from University of Helsinki Web site:

http://www.netlab.hut.fi/opetus/s38153/k2003/Lectures/g42GSM_security.pdf

[10] Max Stepanov. GSM Security. (PowerPoint introduction to GSM Security).

Retrieved December 9, 2007, from The Rachel and Selim Benin School of

Computer Science and Engineering, The Hebrew University of Jerusalem Web

site: http://www.cs.huji.ac.il/~sans/students_lectures/GSM%20Security.ppt

13
[11] Wei Zhang. (2000, Nov. 15). GSM Security Issues. Notes on Introduction to

GSM Security Issues. Retrieved December 9, 2007, from the Department of

Computer Engineering, Iowa State University Web site:

http://www.ee.iastate.edu/~russell/cpre537xf00/Projects/weizhang.pdf

[12] Kaj J. Grahn, Goran Pulkkis, Jean-Sebastien Guillard. (2002, June). Security

of Mobile and Wireless Networks. (Informing Science Conference Paper).

Retrieved December 10, 2007, from Informing Science Web site:

www.informingscience.org/proceedings/IS2002Proceedings/papers/Grahn152

Secur.pdf

14

You might also like