【24h】

A Cryptographic Analysis of UMTS/LTE AKA

机译:UMTS / LTE AKA的密码学分析

获取原文

摘要

Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key deri-vation protocols. The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of AES-based algorithms called MILENAGE; as an alternative, the ETSI SAGE committee submitted the TUAK algorithms, which rely on a truncation of the internal permutation of Keccak. In this paper, we provide a formal security analysis of the AKA protocol in its complete three-party setting. We formulate requirements with respect to both Man-in-the-Middle (MiM) adversaries, i.e. key-indistinguishability and impersonation security, and to local untrusted serving networks, denoted "servers", namely state-confidentiality and soundness. We prove that the unmodified AKA protocol attains these properties as long as servers cannot be corrupted. Furthermore, adding a unique server identifier suffices to guarantee all the security statements even in in the presence of corrupted servers. We use a modular proof approach: the first step is to prove the security of (modified and unmodified) AKA with generic cryptographic algorithms that can be represented as a unitary pseudorandom function -PRF- keyed either with the client's secret key or with the operator key. A second step proceeds to show that TUAK and MILENAGE guarantee this type of pseudorandomness, though the guarantee for MILENAGE requires a stronger assumption. Our paper provides (to our knowledge) the first complete, rigorous analysis of the original AKA protocol and these two instantiations. We stress that such an analysis is important for any protocol deployed in real-life scenarios.
机译:移动用户及其关联的运营商网络之间的安全通信需要相互认证和密钥衍生协议。 3GPP标准仅出于此目的提供AKA协议。它的结构是通用的,可以用一组七个密码算法实例化。当前使用的提议通过一组称为MILENAGE的基于AES的算法来实例化它们。作为替代方案,ETSI SAGE委员会提交了TUAK算法,该算法依赖于Keccak内部排列的截断。在本文中,我们对AKA协议的完整三方设置进行了正式的安全性分析。我们针对中间人(MiM)对手(即密钥不可区分性和模拟安全性)以及本地不受信任的服务网络(称为“服务器”)制定了要求,即状态机密性和健全性。我们证明,只要服务器不被破坏,未经修改的AKA协议即可获得这些属性。此外,添加唯一的服务器标识符足以保证所有安全性声明,即使在存在损坏的服务器的情况下也是如此。我们使用模块化证明方法:第一步是使用通用密码算法来证明(已修改和未修改)AKA的安全性,该算法可以表示为单一伪随机函数-PRF-,可以使用客户端的秘密密钥或操作员密钥进行加密。第二步继续进行,表明TUAK和MILENAGE保证了这种类型的伪随机性,尽管对MILENAGE的保证需要更强的假设。我们的论文(据我们所知)对原始AKA协议和这两个实例进行了首次完整,严格的分析。我们强调,这种分析对于现实生活中部署的任何协议都是重要的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号