GSM Security and Authentication
GSM Security and Authentication
GSM Security and Authentication
1. Introduction
(2G) cellular communication system, initiated by Europeans and widely used all
over the world. GSM together with other modern communication technologies
provide a range of services which include voice and video calling service, short
messaging service (SMS), multimedia messaging service (MMS), call divert, call
waiting, call forwarding, and call baring services, circuit-switched data (HCSD),
world use GSM for different purposes. Most of them use this system for calling
and messaging but some also use the system for internet and mobile TV.
Cellular communication systems make use of microwave radio links. The security
like NMT, TACS and AMPS, were less secure. This resulted in significant levels
subscribers as well as the network operators [1]. There was a need to authenticate
users of the system so that the resources would not be misused by nonsubscribers
[2]. This was also realized that these systems need implementation of higher level
of security protocols than the traditional fixed line phones, which offer some
secure communications because the hacker need to have physical access to the
subscriber’s line. Therefore, to protect the system against such kinds of threats,
1
several possible measures were taken. Hence, a new mobile communication
system, so called GSM, came into existence. The objective behind GSM was to
For GSM, like many other widely used communication systems, security is
like subscribers and service providers [3]. This essay discusses the security
features of GSM. Different aspects of GSM security are taken into consideration
GSM incorporates certain security features that prevent (1) unauthorized use of
the network as it maintains the identity and authentication key of the subscriber on
the subscriber’s identity module (SIM), and (2) over-the-air interfacing through
ciphering of the user and signaling data. Subscriber’s identity (IMSI) is further
Identity (TMSI) number [4]. The TMSI number is much smaller in length than the
IMSI number. This is temporary because it keeps on changing from call to call.
Hence, it frees up some signaling space on the spectrum, and there is no need to
on-air the original IMSI, therefore ensuring the confidentiality of the subscriber’s
data and location. References [1-2] and [4-6] provide relevant GSM specifications
2
Figure 2.1: GSM Architecture
2.1. Anonymity
protected over the air interface. GSM does this by making use of a technique,
whenever the system wants to address the subscriber. Both the permanent and
temporary IDs are stored in the SIM. When a mobile phone first switch on in
area, the real identity (IMSI) is used and a temporary identification (TMSI) is
3
issued. From then on the TMSI is used for all communication between mobile
described in the Figure 2.2. Anonymity is the procedure of keeping the IMSI
protects user’s identity from being stolen or hacked, hence, ensuring a high
degree of privacy to the user. This feature also provides better security to the
GSM network operators as they can easily identify the users present on the
network, resulting in correct billing of the phone calls and other services.
2.2. Authentication
The authentication feature ensures to a very high level of probability that the
user is who they claim to be [2]. This feature protects the GSM network from
4
any unauthorized or misuse. The subscriber authentication is performed at
every call attempt, location update, and every time when the mobile set is
Figure 2.3.
in Figure 2.4.
5
The A3 algorithm computes the response of the network and the mobile
subscriber unit, at the same time, by using the secret key of the mobile
process is carried out at the MSC and the mobile, simultaneously. The
responses are then compared and access to the network is granted if both are
same. Only the random number and the mobile subscriber response (SRES)
are transmitted over the radio interface between the MSC and the mobile.
Hence the secret key is not disclosed to anyone. This secret key is issued to
the subscriber at the time of first registration, and is stored in the SIM and the
AuC. The AuC uses this secret key to identify the user as well as to generate
some keys and numbers based on that secret key to use for further
The AuC begins authentication and cipher key generation procedures after
registers (HLR/VLR). The AuC first queries the HLR for the subscriber’s
challenge to be sent to the mobile set for verification of the mobile set
authenticity. RAND is also used by the AuC, with Ki in the algorithm A3 for
mobile subscriber unit. RAND and Ki are also used in the AuC to calculate
6
the Kc with algorithm A8. SRES is a 32-bit number, and Kc is a 64-bit
number. [2]
2.3. Encryption
This feature ensures the privacy and confidentiality of the information, either
the following process. The network generates a random number and sends to
7
the mobile. The mobile uses that random number along with its secret key to
encrypt the plain text. The plain text is then transformed into a ciphered text.
functions into another series of bits which are encrypted bits then. The
encryption process is illustrated in Figure 2.6 [2], where the input is the Plain
RAND by an algorithm (called A8) driven by Ki. Figure 2.5 shows the
process of generating the cipher key Kc. The sequential steps for encryption
and decryption process are shown in Figures 2.7 and 2.8 [2].
8
Figure 2.7: Illustration of encryption and decryption process.
The algorithms are applied before the data is sent over the radio link. The user
as well as signaling data is protected by manipulating the 114 radio bits that
in the receiver immediately after the data stream is recovered in the receiver.
feedback shift registers (LFSRs) is used in GSM. The A5 is first fed with the
64-bit cipher key Kc (for initialization) and the current 22-bit TDMA frame
number. Note that Kc may actually contain less than 64 bits of significance;
9
Figure 2.8: GSM encryption process.
64 bits of the A5 register. Because the output is also a function of the current
TDMA frame number, the output of the clocked A5 shift registers, the
ciphering keys, is different for each TDMA frame and has two different
uplink and downlink cipher sequences of 114 bits each. Finally, the data is
XOR with the cipher keys in order to have enciphered data. To recover the
transmitted enciphered data, the receiver needs to use the same cipher key for
decryption (XOR with received radio bits) that was used by the transmitter
10
2.4. SIM and IMEI
The identity of the subscriber (IMSI) and the authentication key is stored in
the SIM. The IMEI is the mobile equipment identification number which is
used to identify the mobile equipment being used over the network. Both of
these assure that no stolen or unauthorized user and mobile equipment is used
in the system.
3. Conclusion
The objective of this essay is to clearly outline the security features adopted in
GSM. The older mobile communication systems, like NMT, TACS, and AMPS,
subscribers. This did a great financial damage to the network operators as there
was no billing information with the operator. GSM is the first secure mobile
authentication algorithms were used for subscriber identity and correct billing.
The GSM facilitates both the subscriber and the network operator by providing
them a variety of services and security features to ensure their protection against
services.
The details and the location of the subscriber are protected, and full privacy is
11
ensured to the users of the system. This is done by using different ciphering
subscriber identity (TMSI) number is assigned to each active user on the system
authentication key, making it more and more difficult to break the cipher
algorithms.
[1] Raymond Steele, Chin-Chun Lee, Peter Gould. (2001). GSM, cdmaOne and
3G Systems. pp. 145-148. England: John Wiley & Sons, Inc. (0471491853)
[2] Asha Mehrotra. (1997). GSM System Engineering. pp. 151-167. Boston-
[3] Paul Yousef. (2004, Mar. 5). GSM Security: a Survey and Evaluation of the
12
[4] Siegmund M. Redl, Matthias K. Weber, Malcolm W. Oliphant. (1998). GSM
[7] (2007, Dec. 9). GSM-Security.net: Your Portal to the World of GSM Security.
security.net/
[8] Jeremy Quirke. (2004, May 1). Security in the GSM System. (AusMobile
Paper). Retrieved December 9, 2007, from Google Search Engine Web site:
http://www.csd.uoc.gr/~hy457/papers/Security_in_the_GSM_system.pdf
[9] Mikko Suominen. (2003, April 15). GSM Security. Lecture slides: S-38.153
http://www.netlab.hut.fi/opetus/s38153/k2003/Lectures/g42GSM_security.pdf
Retrieved December 9, 2007, from The Rachel and Selim Benin School of
site: http://www.cs.huji.ac.il/~sans/students_lectures/GSM%20Security.ppt
13
[11] Wei Zhang. (2000, Nov. 15). GSM Security Issues. Notes on Introduction to
http://www.ee.iastate.edu/~russell/cpre537xf00/Projects/weizhang.pdf
[12] Kaj J. Grahn, Goran Pulkkis, Jean-Sebastien Guillard. (2002, June). Security
www.informingscience.org/proceedings/IS2002Proceedings/papers/Grahn152
Secur.pdf
14