3G Wireless Security

22
3G Wireless 3G Wireless Security Security By: Bill Barker By: Bill Barker

description

3g wireless security

Transcript of 3G Wireless Security

Page 1: 3G Wireless Security

3G Wireless 3G Wireless SecuritySecurityBy: Bill BarkerBy: Bill Barker

Page 2: 3G Wireless Security

OverviewOverview

What is 3G Wireless?What is 3G Wireless? HSPAHSPA Feistel Encryption/Decryption Feistel Encryption/Decryption KASUMIKASUMI Future Advances/4GFuture Advances/4G

Page 3: 3G Wireless Security

What is 3G Wireless?What is 3G Wireless?

3G is the third generation of mobile 3G is the third generation of mobile phone standardsphone standards

3G is intended for “smartphones”3G is intended for “smartphones” BlackberryBlackberry iPhoneiPhone Etc.Etc.

Page 4: 3G Wireless Security

What is 3G cont.What is 3G cont.

3G increased bandwidth and transfer 3G increased bandwidth and transfer ratesrates Web-based applicationsWeb-based applications Phone-based audio and video filesPhone-based audio and video files

3G’s uses:3G’s uses: Sending and receiving large multimedia filesSending and receiving large multimedia files Downloading info from the internetDownloading info from the internet E-mailE-mail

Page 5: 3G Wireless Security

What is 3G cont.What is 3G cont.

3G’s uses continued:3G’s uses continued: Video ConferencingVideo Conferencing Streaming video for the WebStreaming video for the Web Sending and receiving faxesSending and receiving faxes

December 2007: 190 3G networks in December 2007: 190 3G networks in 40 countries with 200 million 40 countries with 200 million customers, only 6% of the 3 billion customers, only 6% of the 3 billion mobile phone customersmobile phone customers

Page 6: 3G Wireless Security

HSPAHSPA

HSPA - High Speed Packet AccessHSPA - High Speed Packet Access HSDPA - High Speed Downlink Packet HSDPA - High Speed Downlink Packet

Access Access HSUPA - High Speed Uplink Packet AccessHSUPA - High Speed Uplink Packet Access

HSPA:HSPA: Increases peak data ratesIncreases peak data rates Provides more system capacityProvides more system capacity Reduces latencyReduces latency

Page 7: 3G Wireless Security

HSDPAHSDPA

Peak data rate of 14 Mbps vs. 1.8 Peak data rate of 14 Mbps vs. 1.8 MbpsMbps

Download large files 20x fasterDownload large files 20x faster

5x system capacity5x system capacity

Page 8: 3G Wireless Security

HSUPAHSUPA

Peak data rate of 5.8 Mbps vs. 0.73 Peak data rate of 5.8 Mbps vs. 0.73 MbpsMbps

Upload large files 10x fasterUpload large files 10x faster

2x system capacity2x system capacity

Page 9: 3G Wireless Security

HSPAHSPA

Increased system capacity makes it Increased system capacity makes it cheaper for service provider to offer cheaper for service provider to offer serviceservice

Latency reduced from 70 ms to 50 Latency reduced from 70 ms to 50 msms Gives user faster responses in Gives user faster responses in

applicationsapplications

Page 10: 3G Wireless Security

Feistel EncryptionFeistel Encryption

Encryption Encryption Plaintext split in halfPlaintext split in half Sub-key applied with function FSub-key applied with function F Output XOROutput XOR Two halves switchedTwo halves switched RepeatedRepeated After last round halves not switchedAfter last round halves not switched

Page 11: 3G Wireless Security

Feistel EncryptionFeistel Encryption

Page 12: 3G Wireless Security

Feistel Decryption Feistel Decryption

DecryptionDecryption Ciphertext split in halfCiphertext split in half Sub-key applied with function F in Sub-key applied with function F in

reverse reverse Output XOROutput XOR Two halves switchedTwo halves switched RepeatedRepeated After last round halves not switchedAfter last round halves not switched

Page 13: 3G Wireless Security

Feistel DecryptionFeistel Decryption

Page 14: 3G Wireless Security

KASUMIKASUMI

Encryption used for confidentiality Encryption used for confidentiality and integrity in 3G mobile devicesand integrity in 3G mobile devices

Hardware based encryptionHardware based encryption

Feistel structure with 8 roundsFeistel structure with 8 rounds

Page 15: 3G Wireless Security

KASUMIKASUMI

64-bit data blocks64-bit data blocks

128-bit encryption key128-bit encryption key

64-bit ciphertext64-bit ciphertext

Page 16: 3G Wireless Security

Future Advances/4GFuture Advances/4G

Fully IP-based Fully IP-based

Higher speeds - 100 Mbps – 1 GbpsHigher speeds - 100 Mbps – 1 Gbps

Verizon – LTEVerizon – LTE

Sprint/Nextel - WiMAXSprint/Nextel - WiMAX

Page 17: 3G Wireless Security

LTELTE

LTE – Long Term EvolutionLTE – Long Term Evolution

Peak Data Rates:Peak Data Rates: Downlink – 100 Mbps, Uplink – 50 MbpsDownlink – 100 Mbps, Uplink – 50 Mbps

Latency 5 ms Latency 5 ms

Projected for 2010 - 2012Projected for 2010 - 2012

Page 18: 3G Wireless Security

WiMAXWiMAX

WiMAX – World Interoperability for WiMAX – World Interoperability for Microwave Access (IEEE 802.16)Microwave Access (IEEE 802.16)

Peak Data Rate – 70 MbpsPeak Data Rate – 70 Mbps

Range – 30 miles from base stationRange – 30 miles from base station

Page 19: 3G Wireless Security

WiMAX Cont.WiMAX Cont.

Vulnerable to Man-in-the-Middle Vulnerable to Man-in-the-Middle attacksattacks No base station authenticationNo base station authentication

Vulnerable to DoS attacksVulnerable to DoS attacks

Available in some areas currentlyAvailable in some areas currently BaltimoreBaltimore Washington DCWashington DC

Page 20: 3G Wireless Security

RecapRecap

What is 3G?What is 3G? HSPAHSPA

HSDPA – 14 MbpsHSDPA – 14 Mbps HSUPA – 5.8 MbpsHSUPA – 5.8 Mbps Latency – 70 ms to 50 msLatency – 70 ms to 50 ms

Feistel Encryption/DecryptionFeistel Encryption/Decryption KASUMIKASUMI

8 round Feistel8 round Feistel

Page 21: 3G Wireless Security

Recap Cont.Recap Cont.

Future Advances/4GFuture Advances/4G LTE – 100 MbpsLTE – 100 Mbps WiMAX – 70 MbpsWiMAX – 70 Mbps

Page 22: 3G Wireless Security

Questions?Questions?