Computer Science – Cryptography and Security
Scientific paper
2012-03-17
Computer Science
Cryptography and Security
Scientific paper
One of the forerunners and main candidates for the fourth generation (4G) generation mobile communication system is commonly known under the name Long-Term Evolution (LTE) and its standard is produced and maintained by the international 3rd Generation Partnership Program (3GPP) consortium. The LTE Authentication and Key Agreement (AKA) protocol design is based on the Universal Mobile Telecommunications System (UMTS) AKA protocol, which is widely used today for third generation (3G) wireless networks. The authentication protocols for these mobile network systems will arguably become the most widely used security protocols in the near future. We present a computational security analysis of both the LTE AKA and the UMTS AKA. This work constitutes the first security analysis of LTE AKA to date. Our analysis is based on a computational security model. Moreover, we report on a deficiency in the protocol specifications, and show how this may enable attacks on both LTE AKA and UMTS AKA. The vulnerability can be exploited by both an outside and an inside attacker who can violate entity authentication properties. It allows an inside attacker not only to impersonate an honest protocol participant during a run of the protocol but also use subsequent wireless services on his behalf. We propose corrections to the authentication protocols and use the software tool CryptoVerif to obtain security proofs for the corrected UMTS and LTE protocols.
Mjølsnes Stig
Tsay Joe-Kai
No associations
LandOfFree
Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-313109