【24h】

A Cryptographic Analysis of UMTS/LTE AKA

机译:UMTS / LTE AKA的加密分析

获取原文

摘要

Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key deri-vation protocols. The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of AES-based algorithms called MILENAGE; as an alternative, the ETSI SAGE committee submitted the TUAK algorithms, which rely on a truncation of the internal permutation of Keccak. In this paper, we provide a formal security analysis of the AKA protocol in its complete three-party setting. We formulate requirements with respect to both Man-in-the-Middle (MiM) adversaries, i.e. keyindistinguishability and impersonation security, and to local untrusted serving networks, denoted "servers", namely state-confidentiality and soundness. We prove that the unmodified AKA protocol attains these properties as long as servers cannot be corrupted. Furthermore, adding a unique server identifier suffices to guarantee all the security statements even in in the presence of corrupted servers.We use a modular proof approach: the first step is to prove the security of (modified and unmodified) AKA with generic cryptographic algorithms that can be represented as a unitary pseudorandom function –PRF– keyed either with the client's secret key or with the operator key. A second step proceeds to show that TUAK and MILENAGE guarantee this type of pseudorandomness, though the guarantee for MILENAGE requires a stronger assumption. Our paper provides (to our knowledge) the first complete, rigorous analysis of the original AKA protocol and these two instantiations. We stress that such an analysis is important for any protocol deployed in real-life scenarios.
机译:移动订阅者和其关联的操作员网络之间的安全通信需要相互认证和关键DER- vation协议。 3GPP标准为此目的提供了AKA协议。其结构是通用的,要用一组七个加密算法实例化。目前二手建议通过一组名为MILENAGE的基于AES的算法来实例化这些算法;作为替代方案,ETSI Sage委员会提交了TUAK算法,依靠截断KECCAK的内部排列。在本文中,我们在完整的三方环境中提供了AKA协议的正式安全分析。我们对中间人(MIM)对手的要求,即KeyDindistinguisty和冒充安全性,以及当地不受信任的服务网络,表示“服务器”,即国家 - 机密性和健全性。只要服务器无法损坏,我们就证明未修改的AKA协议率为这些属性。此外,添加唯一的服务器标识符,以保证损坏服务器的存在,以保证所有安全陈述。我们使用模块化证明方法:第一步是通过通用加密算法证明(修改和未修改)的安全性(修改和未修改)的安全性可以表示为单一的伪和谐函数-prf-与客户端的密钥或运算符密钥键入。第二步继续表明Tuak和Milenage保证这种类型的伪随机性,尽管Milenage的保证需要更强烈的假设。我们的论文提供(对我们的知识)第一个完整,严格的原始AKA协议分析和这两个实例化。我们强调,这种分析对于部署在现实方案中的任何协议都很重要。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号