ETSI GSM 03 20-1992 European Digital Cellular Telecommunication System (Phase 1) Security- Related Network Functions《欧洲数字蜂窝通信系统(第1阶段) 安全相关的网络功能》.pdf

上传人:livefirmly316 文档编号:733645 上传时间:2019-01-08 格式:PDF 页数:46 大小:1.26MB
下载 相关 举报
ETSI GSM 03 20-1992 European Digital Cellular Telecommunication System (Phase 1) Security- Related Network Functions《欧洲数字蜂窝通信系统(第1阶段) 安全相关的网络功能》.pdf_第1页
第1页 / 共46页
ETSI GSM 03 20-1992 European Digital Cellular Telecommunication System (Phase 1) Security- Related Network Functions《欧洲数字蜂窝通信系统(第1阶段) 安全相关的网络功能》.pdf_第2页
第2页 / 共46页
ETSI GSM 03 20-1992 European Digital Cellular Telecommunication System (Phase 1) Security- Related Network Functions《欧洲数字蜂窝通信系统(第1阶段) 安全相关的网络功能》.pdf_第3页
第3页 / 共46页
ETSI GSM 03 20-1992 European Digital Cellular Telecommunication System (Phase 1) Security- Related Network Functions《欧洲数字蜂窝通信系统(第1阶段) 安全相关的网络功能》.pdf_第4页
第4页 / 共46页
ETSI GSM 03 20-1992 European Digital Cellular Telecommunication System (Phase 1) Security- Related Network Functions《欧洲数字蜂窝通信系统(第1阶段) 安全相关的网络功能》.pdf_第5页
第5页 / 共46页
点击查看更多>>
资源描述

1、ETSI/IC SMG Released by : ETSI/pT 12 Release date: February 1992 I I Previously distributed version : 3.3.2 (Updated Release 1 /90) l New Released version February 92 : 3.3.2 (Release 92, Phase i) = 3404583 0070084 990 RELEASE NOTE Recommendation GSM 03.20 Security-related Network Functions 1. Reaso

2、n for chancres No changes since the previously distributed version. 3404583 0070085 827 ETS I-GSM Tech n ica I Specification GSM 03.20 Version 3.3.2 UDC: 621.396.21 Key words: European Digital Cellular Telecommunications System, Global System for Mobile Communications (GSM) European digital cellular

3、 telecommunication system (phase 1); Security-related Network Functions ETSI European Telecommunications Standards Institute ETSI Secretariat: B.P.152 . F - 06561 Valbonne Cedex . France TP. + 33 92 94 42 00 TF. + 33 93 65 47 16 Tx. 47 00 40 F Copyright European Telecommunications Standards Institut

4、e 1992. All rights resewed. No part may be reproduced or used except as authorbed by contract or other written permission. The copyright and the foregoing restriction on reproduction and use extend to all media in which the information may be embodied. 3404583 007008b 7b3 PREFATORY NOTE iSI has cons

5、tituted stable and consistent documents which give specifications for the implementation of the European Cellular Telecommunications System. Historically, these documents have been identified as “GSM recommendations“. Some of these recommendations may subsequently become interim European Telecommuni

6、cations Standards (I-iss) or European Telecommunications Standards (ETSs), whilst some continue with the status of ETSI-GSM Technical Specifications. These ETSI-GSM Technical Specifications are for editorial reasons stili referred to as GSM recommendations in some current GSM documents. _, The numbe

7、ring and version control system is the same for ETSI-GSM Technical Specifications as for “GSM recommendations“. W 3404583 0030087 bTT Page 1 GSM 03.20 - version 3.3.2 : January 1991 TABLE OF CONTENTS O. SCOPE 1. GENERAL 2. SUBSCRIBER IDENTITY CONFIDENTIALITY 2.1 Generality 2.2 Identifying method 2.3

8、 Procedures 2.3.1 Location up-dating in the same MSC area 2.3.2 Location up-dating between MSCs area, within the same VLR area : 2.3.3 Location Updating between different VLRs 2.3.4 Re-allocation of a new TMSI 2.3.5 Local TMSI unknown 2.3.6 Location up-dating between VLRs in case of a loss of in for

9、mation : 3. SUBSCRIBER IDENTITY AUMENTICATION 3.1 Generality 3.2 The authentication procedure 3.3 Subscriber Authentication Key Management 3.3.1 No transmitting of the key 3.3.2 Transmitting the authentication key 3.4 Ciphering key sequence number 4. CONFIDENTIALIW OF SIGNALLING INFORMATION ELEMENTS

10、, CONNECTIONLESS DATA AND USER INFORMATION ELEMENTS ON PHYSICAL CONNECTIONS 4.1 Generality 4.2 The ciphering method 4.3 Key setting 4.4 Starting of the ciphering and deciphering procesces 4.5 Synchronisation 4.6 Handsver 5. symmc SUMMARY ANNEX 1 Al .1. Introduction Al .2. Short description of the sc

11、hemes Al .3. List of abbreviations A1.4. Schemes A2.1. Introduction A2.2. Entities and Security Information A3.0. SCOPE A3.1. SPECIFICATIONS FOR ALGORITHM A5 ANNEX 2 ANNEX 3 A3.1.1. Purpose A3.1.2. Implementation indications A3.1.3. External specifications of Algorithm A5 A3.1.4. Internal specificat

12、ion of Algorithm A5 A3.2. ALGORITHM A3 A3.2.1. Purpose A3.2.2. Implementation and operational requirements A3.2.3. Proposal for an Algorithm A3 A3.3.1. Purpose A3.3.2. Implementation and operational requirements A3.3.3. Proposals for an Algorithm A8 A3.3. ALGORITHM A8 3 3 4 4 4 5 5 5 6 7 8 9 10 10 1

13、0 11 11 14 15 16 16 16 17 17 18 18 19 21 21 21 23 24 38 38 38 40 40 40 40 40 42 42 42 42 42 43 43 43 44 44 3404583 0070088 536 Pago 3 GSM 03.20 - version 3.3.2 : Janu8ry 1991 O. SCOPE This recommendation specifies the network functions needed to provide the security related service and functions spe

14、cified in Recommendation GSM 02.09. This recommendation does not address the cryptological algorithms that are needed to provide different security related features. This topic is addressed in Annex 3 Whermw a ctyptological algorithm or mechanism is needed, this is signalled with a reference to Anne

15、x 3 The references refers only to functionalities, and some algorithms may be identical or usa common hardware. i. GENERAL The different security related service and functions that are listed in Recommendation 02.09 are grouped as follows : - Subscriber identity conf identiality; - Subscriber identi

16、ty authentication: - Signalling information element and connectionless us81 data mfidential, - Data confidentiality for physical connections. All functions must be implemented with minimum assumptions about the cryptologial algorithms that are used, and it must be possible that these algorithms are

17、changed during the system life time. Any change in these algorithms must not change the format of the messages exchanged via the interfaces of the system. The system must be prepared for a parallel operation of more than one algorithm during a transitional period. The security procedures must includ

18、e mechanism to enable reccweq in event of signalling failures. These rscovery procedures must be designed in such a way that they cannot be used to breach the secur of the system. General note on figures : 1- In the figures below, signalling exchanges are referred by functional names. The exact mess

19、ages and message types are specified in Roc. GSM 04.08 and Rec. GSM 09.02. 2- No assumptions are taken for function splitting bawissn MSC (Mobile Switching Centre), MR and BS (Base Station). Signalling is hence described directly between MS and the Id network (ia. MSC, MR, and BS, denoted in the fig

20、ures by BSIMSCNLR). The splitting in Annex 1 is only giwn for illusatha purpose. Addressing fields are not given: all information relate to th signalling layer. The TMSI allows addressing schemes without IMSI, but the actual implementation is specified in the 04. series. 3- e 5- The term HPLMN in th

21、e figures below is useci as a general term which should be understood as HLR (Home Location RegW) or AR (Authentication Centre). What is put in a box is not part of the described procedure but it is relevant to the understanding of the figure. Previous page is blank Pago 4 GISM 03.20 - vorslon 3.3.2

22、 : January 1991 2. SUBSCRIBER IDENTITY CONFIDENTIALITY 2.1 Gonorallty The purposo of this function is to avoid the possibility for an intruder to identify which subscriber is using a giwn resource on the radio path (0.9. (CH Traffic Channel) or signalling resources) by listening to the signalling ex

23、changes on the radio path. This allows first a high level of confidentiality for user data and signaling, and additionally a protscuori against the tracing of the location of a user. The provision of this function implies that the IMSI (Intemational Mobile Subscriber Identity), or any information al

24、lowing a listener to derive easily the IMSI, should not normally be transmitted in clear text in any signaling message on the radio path. Consequently, to obtain the required lewl of protection, it is necessary that: - A protected identifying method is nomially used instead of the IMSI on the radio

25、path: and - The IMSI is not normally used an addressing means on the radio path (see Recammendation GSM 02.09, 3.1.3.): - Signalling information elements that convey an information about the mobile subscriber identi must be ciphered far transmission on the radio path. The identifying method is speci

26、fid in the following section. The ciphering of signalling elements is specified in Section 4. 2.2 Idmntlfylng mothod The meam used to idantyI a mobile subscriber on the radio path cons othc#wb the IMSI b rtquostd to the MS. A new TMSI must bo allocated at laest in each location updating procodwe. Th

27、e allocation of a new TMSI conasporrds implicitly for the MS to he de-alloeaon of the previous one. In tho fixed part of the network, the cancallation of a MS in a MR implies tho daallocation of the corresponding WSI. To cope,with some malfunctioning, 0.9. arising from a software failwe, tho fixed p

28、art of the network can requin tho identification of the MS in clear. This procedure is a breach in the provision of the swvw, and should be used only when n-. When a new TMSI is allocated to a MS, it is tronsmtted to tho MS In a ciphered mode. This ciphered mode is the stme as defined in Section 4 o

29、f this rocommendation. Pago 5 GSY 03.20 - vrrrlon 3.3.2 : J8nUiry 1991 The MS must store iis current TMSI in a non volatile memory, together with the LAI, so that these data are not lost when the MS is off. 2.3 Procoduror This section presents the procedures, or elements of procedures, pertaining to

30、 the management of TMSIS. 2.3.1 Loeatlon up-datlng In tho um. MSC 81 This procedure is part of the location updating procedure taking place when the original location area and the new location area depend on the same MSC. The part of this procedure relative to TMSI management is reduced to a TMSI re

31、-allocation (from TMSlo with “o“ for “old“ to TMSln with “n“ for “new“). MS sends TMSlo as identifying fields at the beginning of the location updating procedure. The procedure is schematised in Figure 2.1. I LAI, TiSIo Muugcnant of meam for neu ciphering (See section 4) Ciph. clmin) Ack. a . Deil l

32、ocat i on U of TMSIO L Figure 2.1 / GSM 03.20 Signalling Functionaiities : Management of metans for new ciphering : The MS and BSIMSCMR agr- on means for ciphering signaling information elements, in particular to r8nsmit TMSln. 2.3.2 Loc8tion up-ditlng botwoon MSCr iroi, wlthln tho um0 tk ir08 : Thi

33、s procedure is part of the location up-dang procedure taking placa when the original location area and the new location area depend on different MSCs, but an the same MR. Tho procedure is schematised on Figure 2.2. m 3404583 0070091 O20 m P8QO 6 GSM 03.20 - vorrlon 3.3.2 : J8nU8ry 1991 Act. 1) Figur

34、e 2.2 I GSM 032 Note (1) : From a securw point of view, he order of the procedures is irrelevant. Signalling fundonalitit#, : Loc. Up-dat : stands for Location Updating. The BSIMSCNLR indicates that the location of the MS must be up-datsd. 2.3.3 Locatlon Updrtlng bowoon dlfforont MRa This procedure

35、is part of the normal location updating procedwo, using TMSI and LAI, when the original location ama and the new location area depend on different VLRs. MS is Mill registered in MRO (“oy for old or original) and asks for its registration in VLRn (In” for new). LAI and TMSlo are sent by MS as identif

36、ying field during the location updating procedure. The procedure is schemased on Figuro 2.3. m 3404583 O070092 T67 m Pago 7 GSM 03.20 - vorrlon 3.3.2 : Jlnuir Sec.Rel.lnf of TMSln clph. (TMSln) 1) Loc. Up-dit. 1) /YF C-el(.tlml + Deal location U of TMSIO Figure 2.3 /GSM 03.20 .Note (1) : From a secu

37、rity point of view, the order of the proaxlures is irrelevant. Signalling functionalities : Sec.Rel .Inf o.: Stands for Security Related information. The MSCMRn needs 1991 some information for ciphering: these information are obtained from MSCNLRo. Cancellation : The HLR indicates to MRo that the MS

38、 is now under control of another VLR. The “old“ TMSI id free for allocation. 2.3.4 Roiillocation of now TMSI This function can be initiated by the network side at any time. The procedure can be included in other procedures, through the means of optional parameters. The execution of this function id

39、left to the network operator. This procedure is schematised in Figure 2.4. D 3404583 0070093 9T3 Page 8 GSM 03.20 - version 3.3.2 : Janurry 1991 I I Allocation I of TMSn Ciph. (TWSIn) I Deal lout ion U O? 1m1o I Figure 2.4 /GSM 03.20 2.3.5 Local TMSI unknown This procedure is a variant of the proced

40、ure described in Section 2.3.1 and Section 2.3.2, and happens when a data loss has occurred in a VLR and when a MS uses an unknown TMSI, ag. for a communication request or for a location up-dating request in a location area managed by the same VLR. This prtxedure is schematisod in Figure 2.5. I I I

41、I -1 I Menwmtt of mm for im I cipherinn (see uction 4) Ciph. (TIISIn) Ack. d L Figure 2.5 /GSM 03.20 Note (i) : Any message in which TMSlo is usad as an identifying means in a location area managed by the same MR. m 3404583 0070094 83T m Page 9 QSM 03.20 - vrrslon 3.3.2 : January 1991 2.3.6 Location

42、 up-dating botworn MRs In caso of a loss of In formation : This variant of the procedure described in 2.3.3 arises when VLR in charge of the MS has suffered a loss of data. In that case the relation between TMSlo and IMSI is lost, and the identification of the MS in clear is necessary. The procedure

43、 is schematised in Figure 2.6. aM9aWnt of means for neu ciphering (see section 4) ciph. (TMSIn) 1) Loc. Up-Lt. 1) I - II - Deallocation U of TMlo Figure 2.6 / GSM 03.20 Note (1) : Form a security point of view, the order of the procedures is irrelevant. 3404583 0070095 776 Pago IO QSM 03.20 - vordon

44、 3.3.2 : Jinuiw 1991 3. SUBSCRIBER IDENTITY AUTHENTICATION Definition and operationai requiremenls of subscriber identity authentication are given in Recommendation GSM 02.09. The authentication procedure will bs also used to pdm the cipher keysetting (SZIO Saction 4) on dedicated signalling channel

45、s. Thwdore, it is pwfd after the subscriber identity (TMSI/IMSI) is known by the nework and before the channel is encrypted. Two network functions are nv: the authentication procedure itself, and the key management inside the fixed sub-system. 3.2 Tho 8uthoncaon procoduro The authentication procedur

46、e corisists in the following exchange between the fixed sub-system and the MS. - The fixed su- ansmits a non-predictable numbw RAND to the MS. - The MS computes the signature of RAND, say SRES, using algorithm A3, and some setcret informriaon : the Subscriber Authmtication Key, denoted Ki in the seq

47、uel. - The MS transmits the signature SRES to the fixed sub-system. - The fixed sub-systm tests SRES for vaiidiy. The general procedure is schematisod in Figure 3.1. Figuro 3.1 / GSM 03.20 Algorithm A3 is specified In Annex 3. 3404583 0070096 602 Pago 11 GSM 03.20 - vonfon 3.3.2 : Janu8ry 7991 3.3 S

48、ubscrlbor Authontlcatlon Koy Managomont The Subscriber Authentication Key Ki is allocated at subscription time. together with the IMS1. The Subscriber Authentication Key is stored on the network side in the HPLMN (Home Public Land Mobile Network), in an Authentication Centre. A PLMN may contain one

49、or more Authentication Centres. An Authentication Centre can be implemented together with other functions, e.g. in a HLR (Home Location Register). Two management modes are specified. The second one, specified in Section 3.3.2, is less secure than the first one, specified in Section 3.3.1, and should not be used between two PLMNs. The procedures are such that the decision to w one or the other of the two methods inside one PLMN is done by the network operator. 3.3.1 No trsnrmlttlng of tho key 3.3.1.1 Qenoral ruthonticatlon procoduro When needed for each MS, the BSI

展开阅读全文
相关资源
猜你喜欢
  • ASTM G69-1997(2009) Standard Test Method for Measurement of Corrosion Potentials of Aluminum Alloys《铝合金潜在腐蚀性的标准试验方法》.pdf ASTM G69-1997(2009) Standard Test Method for Measurement of Corrosion Potentials of Aluminum Alloys《铝合金潜在腐蚀性的标准试验方法》.pdf
  • ASTM G69-2012 Standard Test Method for Measurement of Corrosion Potentials of Aluminum Alloys《测定铝合金潜在腐蚀性的标准试验方法》.pdf ASTM G69-2012 Standard Test Method for Measurement of Corrosion Potentials of Aluminum Alloys《测定铝合金潜在腐蚀性的标准试验方法》.pdf
  • ASTM G7 G7M-2011 Standard Practice for Atmospheric Environmental Exposure Testing of Nonmetallic Materials《非金属材料的大气环境曝光试验的标准操作规程》.pdf ASTM G7 G7M-2011 Standard Practice for Atmospheric Environmental Exposure Testing of Nonmetallic Materials《非金属材料的大气环境曝光试验的标准操作规程》.pdf
  • ASTM G7 G7M-2013 Standard Practice for Atmospheric Environmental Exposure Testing of Nonmetallic Materials《非金属材料大气环境曝光测试的标准实施规程》.pdf ASTM G7 G7M-2013 Standard Practice for Atmospheric Environmental Exposure Testing of Nonmetallic Materials《非金属材料大气环境曝光测试的标准实施规程》.pdf
  • ASTM G7-2005 Standard Practice for Atmospheric Environmental Exposure Testing of Nonmetallic Materials《非金属材料的大气环境曝露试验的标准规程》.pdf ASTM G7-2005 Standard Practice for Atmospheric Environmental Exposure Testing of Nonmetallic Materials《非金属材料的大气环境曝露试验的标准规程》.pdf
  • ASTM G71-1981(2003) Standard Guide for Conducting and Evaluating Galvanic Corrosion Tests in Electrolytes《电解液中电流腐蚀测试的实施和评定》.pdf ASTM G71-1981(2003) Standard Guide for Conducting and Evaluating Galvanic Corrosion Tests in Electrolytes《电解液中电流腐蚀测试的实施和评定》.pdf
  • ASTM G71-1981(2009) Standard Guide for Conducting and Evaluating Galvanic Corrosion Tests in Electrolytes《电解液中电流腐蚀测试的实施和评定的标准指南》.pdf ASTM G71-1981(2009) Standard Guide for Conducting and Evaluating Galvanic Corrosion Tests in Electrolytes《电解液中电流腐蚀测试的实施和评定的标准指南》.pdf
  • ASTM G71-1981(2014) Standard Guide for Conducting and Evaluating Galvanic Corrosion Tests in Electrolytes《电解液中电流腐蚀测试的实施和评估的标准指南》.pdf ASTM G71-1981(2014) Standard Guide for Conducting and Evaluating Galvanic Corrosion Tests in Electrolytes《电解液中电流腐蚀测试的实施和评估的标准指南》.pdf
  • ASTM G72 G72M-2009 Standard Test Method for Autogenous Ignition Temperature of Liquids and Solids in a High-Pressure Oxygen-Enriched Environment《高压富氧环境中液体和固体的自燃温度用标准试验方法》.pdf ASTM G72 G72M-2009 Standard Test Method for Autogenous Ignition Temperature of Liquids and Solids in a High-Pressure Oxygen-Enriched Environment《高压富氧环境中液体和固体的自燃温度用标准试验方法》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1