ETSI Security Activities Overview

advertisement
ETSI Security Activities
Overview
Charles Brookson
ETSI OCG Sec Chairman, UK DTI
cbrookson@iee.org
Dionisio Zumerle
ETSI Secretariat
dionisio.zumerle@etsi.org
ETSI Security Workshop
January 2007
1
Agenda
‰Overview and OCG Security
‰
‰
‰
‰
‰
‰
‰
Mobile and Wireless Security
Algorithms
Smart Cards
Next Generation Networks Security
Lawful Interception
Electronic Signatures
Future Challenges
ETSI Security Workshop
January 2007
2
ETSI Committees per Security Areas
Emergency
Telecommunications
Mobile/Wireless
Algorithms
SES
Security
Algorithms Group
of Experts
(SAGE)
MESA*
2G/3G Mobile
3GPP*
EMTEL
DECT
Co Mo
m bile
m
er
ce
**
TETRA
In
L
te aw
rc fu
e l
(L pti
I) o n
Electronic
Signatures
(ESI)
SmartCard
Platform
(SCP)
Smart Cards
Information Technology
Infrastructure
AT
Next Generation
Networks
(TISPAN)
Fixed and
Convergent Networks
* ETSI is a founding partner for this partnership project
** Closed Committee
ETSI Security Workshop
January 2007
3
OCG Security
‰ Operational Co-ordination ad hoc Group on Security
‰ Horizontal co-ordination structure for security issues
¾ Ensuring security is properly considered in each ETSI
Technical Body (TB)
¾ Detecting any conflicting or duplicate work
‰ Participation:
¾ TBs are free to nominate Members to participate in the
work of the group
‰ Working methods:
¾ Via email
¾ When necessary co-sited “joint security” technical
working meetings
¾ Issues sent to SECsupport@etsi.org
¾ Mailing list: OCG_SECURITY@LIST.ETSI.ORG
ETSI Security Workshop
January 2007
4
Agenda
‰ Overview and OCG Security
‰Mobile and Wireless Security
‰
‰
‰
‰
‰
‰
Algorithms
Smart Cards
Next Generation Networks Security
Lawful Interception
Electronic Signatures
Future Challenges
ETSI Security Workshop
January 2007
5
GSM and 3G
‰ IMEI (International Mobile Equipment Identity)
¾ Protection against theft
¾ Physical marking of the terminal
¾ Blacklisted by operator if stolen
‰ FIGS (Fraud Information Gathering System)
¾ Monitors activities of roaming subscribers
¾ Home network informed
¾ Fraudulent calls identified terminated
‰ Priority
¾ Public safety service
¾ Allows for high priority access
‰ Location
ETSI Security Workshop
January 2007
6
TETRA
‰ TErrestrial Trunked Radio
‰ Mobile radio communications
¾ Used for public safety services
‰ Security features include:
¾ Mutual Authentication
¾ Encryption
¾ Anonymity
ETSI Security Workshop
January 2007
7
Agenda
‰ Overview and OCG Security
‰ Mobile and Wireless Security
‰Algorithms
‰
‰
‰
‰
‰
Smart Cards
Next Generation Networks Security
Lawful Interception
Electronic Signatures
Future Challenges
ETSI Security Workshop
January 2007
8
Algorithms
‰ ETSI is a world leader in creating cryptographic
algorithms and protocols to prevent fraud and
unauthorised access to ICT and broadcast networks,
and to protect customers’ privacy
‰ ETSI SAGE (Security Algorithm Group of Experts)
¾ Centre of competence for algorithms in ETSI
‰ Algorithms for:
¾
¾
¾
¾
¾
DECT
GSM, GPRS, EDGE
TETRA
UMTS
…
ETSI Security Workshop
January 2007
9
GSM and UMTS Algorithms
‰ GSM and EDGE
¾ A3, A5 and A8 – used in most GSM networks all over the
world
‰ GPRS
¾ GEA3 – encryption algorithms used
‰ UMTS radio interface (UTRA)
¾ UEA1 and UIA1
Providing Encryption and Integrity
¾ UEA2 and UIA2 just released
¾ For more info: ETSI TR 133 908
ETSI Security Workshop
January 2007
10
Agenda
‰ Overview and OCG Security
‰ Mobile and Wireless Security
‰ Algorithms
‰Smart Cards
‰
‰
‰
‰
Next Generation Networks Security
Lawful Interception
Electronic Signatures
Future Challenges
ETSI Security Workshop
January 2007
11
Smart cards
‰ Smart cards
¾ Micro-processor equipped Tokens
¾ Able to store and process information
• Private key
• Biometric template
• …
¾ Provide Strong Authentication
¾ Used in:
•
•
•
•
•
Banking
Healthcare
Telecoms
IT
…
ETSI Security Workshop
January 2007
12
Smart Card Standardization
‰ ETSI Smart Card Standardization
¾ ETSI Technical Committee Smart Card Platform
(TC SCP)
¾ GSM SIM Cards: among most widely deployed smart cards ever
¾ Work extended with UMTS USIM Card and UICC Platform
‰ Current challenges
¾ Expand the smart card platform
¾ Implement Extensible Authentication Protocol (EAP) in Smart
Cards
¾ Allow users access to global roaming
¾ UICC platform in secure financial transactions over mobile
communications systems
ETSI Security Workshop
January 2007
13
Agenda
‰
‰
‰
‰
Overview and OCG Security
Mobile and Wireless Security
Algorithms
Smart Cards
‰Next Generation Networks Security
‰ Lawful Interception
‰ Electronic Signatures
‰ Future Challenges
ETSI Security Workshop
January 2007
14
ETSI TISPAN WG7
‰ NGN concept: fixed-mobile network convergence to
packet-switched technology delivering multimedia
services
‰ ETSI extending the 3GPP IMS concepts
in TISPAN Committee designing NGN
¾ (TISPAN = Telecommunication and Internet converged Services
and Protocols for Advanced Networking)
‰ Working Group 7 NGN competence centre for
security with a group of security experts
‰ WG7 standardizes NGN security
www.tispan.org
ETSI Security Workshop
January 2007
15
NGN R1 Security Standards
NGN Architecture (NASS, RACS, …)
IMS Security Architecture
NGN Release 1
Security Requirements
TR 187 001
NGN Release 1
Threat, Vulnerabilities, Risk Analysis
TR 187 002
NGN Release 1 Security Architecture TS 187 003
Security Domains
Security Services
Security Functions
Countermeasures
Security Components and Building Blocks
NGN Release 2 Security Architecture
ETSI Security Workshop
January 2007
16
Agenda
‰
‰
‰
‰
‰
Overview and OCG Security
Mobile and Wireless Security
Algorithms
Smart Cards
Next Generation Networks Security
‰Lawful Interception
‰ Electronic Signatures
‰ Future Challenges
ETSI Security Workshop
January 2007
17
What is Lawful Interception?
‰ Delivery of intercepted communications
to Law Enforcement Authorities
¾ To support criminal investigation
¾ To counter terrorism
‰ Applies to data in transit
¾ not a search of records
‰ Applied to any data in transit
¾
¾
¾
¾
¾
Signalling
Speech
Video
Email
Web
ETSI Security Workshop
January 2007
18
Simple architecture
Interception
interface
Correspondent
target
Handover interface
Monitor
ETSI Security Workshop
January 2007
19
Agenda
‰
‰
‰
‰
‰
‰
Overview and OCG Security
Mobile and Wireless Security
Algorithms
Smart Cards
Next Generation Networks Security
Lawful Interception
‰Electronic Signatures
‰ Future Challenges
ETSI Security Workshop
January 2007
20
Electronic Signatures
‰ ETSI and CEN co-operation on the European
Electronic Signature
‰ Goal: provide Europe with a
reliable electronic signatures framework
¾ Enabling electronic commerce
¾ Supporting eSignature EC Directive
‰ Current challenges
¾ eInvoicing
¾ Registered EMail (REM)
‰ International collaboration
¾ Certificate Policy mapped and aligned with US policy
¾ XML Signature Standard adopted in Japan
ETSI Security Workshop
January 2007
21
Agenda
‰
‰
‰
‰
‰
‰
‰
Overview and OCG Security
Mobile and Wireless Security
Algorithms
Smart Cards
Next Generation Networks Security
Lawful Interception
Electronic Signatures
‰Future Challenges
ETSI Security Workshop
January 2007
22
Future Challenges
‰ A number of issues are open
¾ Product Proofing
¾ DRM
¾ NGN
¾ Retained Data
¾ …
‰ Security Standards for the
Future Technologies are the Next Challenge
‰ ETSI can meet that challenge
ETSI Security Workshop
January 2007
23
Thank you for your attention
cbrookson@iee.org
dionisio.zumerle@etsi.org
OCG_SECURITY@LIST.ETSI.ORG
ETSI Security Workshop
January 2007
24
Download