A00-20050214-017 Ericsson AKA discussion

advertisement
3GPP2 A00-200502xx-xxx Ericsson AKA discussion.doc
TSG-A
TITLE:
Background Material for AKA Discussion
SOURCE:
Ericsson Inc
Ericsson Inc
Erik Colban
5012 Wateridge Vista Drive
San Diego, CA 92121
Vibhor Julka
5012 Wateridge Vista Drive
San Diego, CA 92121
Erik.Colban@ericsson.com
Vibhor.Julka@ericsson.com
ABSTRACT:
This contribution provides input to a discussion on the introduction of AKA in the IOS.
RECOMMENDATION: FYI
Ericsson Inc. grants a free, irrevocable license to 3GPP2 and its Organizational Partners to
incorporate text or other copyrightable material contained in the contribution and any
modifications thereof in the creation of 3GPP2 publications; to copyright and sell in
Organizational Partner's name any Organizational Partner's standards publication even though it
may include all or portions of this contribution; and at the Organizational Partner's sole discretion
to permit others to reproduce in whole or in part such contribution or the resulting Organizational
Partner's standards publication. Ericsson Inc. is also willing to grant licenses under such
contributor copyrights to third parties on reasonable, non-discriminatory terms and conditions for
purpose of practicing an Organizational Partner’s standard which incorporates this contribution.
This document has been prepared by Ericsson Inc. to assist the development of specifications by
3GPP2. It is proposed to the Committee as a basis for discussion and is not to be construed as a
binding proposal on Ericsson Inc. Ericsson Inc. specifically reserves the right to amend or
modify the material contained herein and to any intellectual property of Ericsson Inc. other than
provided in the copyright statement above.
1
Terms
AC. See Authentication Center.
AKA. Authentication and Key Agreement. An authentication procedure that allows
mutual authentication of the mobile station and base station.
Authentication Center (AC). An entity that manages the authentication information
related to the mobile station.
Authentication Response (AUTHR). An 18-bit output of the authentication algorithm.
It is used, for example, to validate mobile station registrations, originations and
terminations.
AV. Authentication Vector used by AKA.
CCK. An encryption key derived from the CMEA key. A 128-bit pattern that is the 64bit CMEA key concatenated with a copy of itself.
CIK. An integrity key derived from the CMEA key. A 128-bit pattern that is the 64-bit
CMEA key concatenated with a copy of itself.
CK. Cipher Key. A 128-bit pattern produced by AKA that is used for encryption.
CMEA. Cellular Message Encryption Algorithm.
EXT_SSEQ. Security sequence number. A 32-bit crypto-sync that is used for
encryption, message integrity, or both.
IK. Integrity Key. A 128-bit pattern produced by AKA that is used for integrity
protection.
MAC-I. Message Authentication Code for message integrity. The 32-bit output of the
message integrity algorithm that allows the receiver to authenticate the message.
MACI. A 32-bit LAC Layer field that carries either the MAC-I or the UMAC of a
signaling message.
NEW_KEY_ID. In ROP, this is the index of the pending (CIK, CCK) and
NEW_SSEQ_H associated with AUTHR. In Authentication Response Message, this is
the index of the pending (IK, CK) and NEW_SSEQ_H associated with the (RANDA,
AUTHN).
NEW_SSEQ_H. The pending 24-bit security sequence number used for encryption
and/or integrity protection.
RANDA. The random challenge number contained in an AV.
RES. A Registration Accepted Order, Extended Channel Assignment Message, or
Security Mode Command Message.
RES. The result computed by the MS based on the received RANDA and sent to the BS,
which the BS uses to verify the authenticity of the MS. [Note: In this contribution, RES is
not italicized when used to refer to the authentication result.]
ROP. A Registration Message, Origination Message, or Page Response Message.
R-UIM. Removable UIM.
UAK. UIM Authentication Key. A 128-bit pattern produced by AKA that is used for
authentication of the R-UIM.
UIM. User Identity Module.
UMAC. A 32-bit output of the UMAC algorithm computed by UIM based on MAC-I.
2
Call flows reflecting AKA text in [C.S0005-C]
The call flows in this section are based on TIA-2000-C, Section 2.3.12.5.
2.1
2G Authentication1 when P_REV_IN_USE ≥ 10
2.1.1
2G Authentication and Key Establishment
Whenever an idle mobile station does not have any integrity key and encryption key to
use, it starts the 2G authentication and key set-up procedures by registering via a
Registration Message, Origination Message, or Page Response Message (ROP). See
section 2.2.4 for the case where the MS already has established a set of keys.
Since the mobile station does not know beforehand whether the serving base station it
roams to supports 2G authentication, 3G authentication, or both, the mobile station
always starts with 2G authentication. In this call flow, we assume that the network uses
2G authentication.
MS
BS
ROP(NEW_KEY_ID, NEW_SEQ_H, AUTHR)
TKey Setup
RES(MACI)
Security Mode Completion Order(MACI)
a.
b.
c.
Figure 1: 2G authentication when P_REV_IN_ USE ≥ 10
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP). The ROP contains a new key id (NEW_KEY_ID) and a
new security sequence number (NEW_SSEQ_H) associated with the AUTHR of the
message. The mobile station also starts a Key Set-Up timer.
b. The base station gets a CMEA key from the network and authenticates the mobile
station’s AUTHR (which is always included). If the authentication is successful,
when the CMEA key is available at the base station, the base station uses assured
mode to send a Registration Accepted Order, Extended Channel Assignment
Message, or Security Mode Command Message (RES) that includes a Message
Authentication Code generated using the pending CIK, and the pending
1
Reference C.S0005-D 2.3.12.5.1
NEW_SSEQ_H (proposed by the mobile station). Upon reception of the RES, the
mobile station validates the MACI. If the validation is successful, the pending (CIK,
CCK) and NEW_SSEQ_H can become “in use” in the mobile station. The mobile
station stores the NEW_KEY_ID in KEY_ID, the CIK in INT_KEY[KEY_ID], and
the CCK in ENC_KEY[KEY_ID]. The mobile station stops the Key Set-Up timer. If
the mobile station receives a RES with an invalid MACI or if the Key Set-Up timer
expires, the mobile station enters the System Determination Substate with an
encryption/message integrity failure indication, which will trigger re-registrations. If
after several attempts of re-registrations such that the integrity key and encryption key
still cannot be established, the mobile station may reject the serving base station, and
the base station may reject serving the mobile station.
c. The MS sends a Security Mode Completion Order to the base station that includes
a Message Authentication Code. At this point, if the base station successfully
validates the Security Mode Completion Order that the mobile station sends, the
pending (CIK, CCK) and NEW_SSEQ_H can become “in use” in the base
station; otherwise, the base station resends the RES until it receives a valid
Security Mode Completion Order from the mobile station. Once (CIK, CCK) has
been established, the mobile station can perform integrity protection and
encryption.
[Note: Until the keys are established, messages that are not essential to the
establishment of the key may be exchanged. These messages shall not include a
MACI. The Extended Channel Assignment Message may be sent after step ‘a’, which
allows for early traffic channel assignment.]
2.1.1.1
Possible Outcomes of the 2G Authentication Procedure
The outcome of a 2G-authentication attempt may be:
1. The MS and BS successfully authenticate each other. The call flow completes with
successful establishment of the (CIK, CCK) in the MS and the BS.
2. The BS successfully authenticates the MS, but the MS fails to authenticate the BS.
This may occur if, in step ‘b’, the MS fails to receive a RES message with a valid
MACI before the Key Set-Up timer expires. The MS enters the System Determination
Substate, which is experienced at the BS as a loss of radio contact.
3. The BS fails to authenticate the MS. This may occur if, in step ‘a’, the AUTHR is
invalid or missing, or, in step ‘c’, the MACI is invalid.
If the AUTHR is invalid or missing, the MSC/BS may reject the registration or call
attempt. In certain cases, e.g., emergency calls, the MSC/BS may allow the call to
proceed. In this case, the BS sends an RES that does not include a MACI and the call
proceeds with subsequent messages not including the MACI.
If the AUTHR is valid but the Security Mode Completion Order does not contain a
valid MACI, the BS resends the RES until it receives a valid Security Mode
Completion Order from the mobile station. In certain cases, e.g., emergency calls, the
MSC/BS may allow the call to proceed. In this case, the call proceeds with
subsequent messages not including the MACI.
2.2
3G Authentication2 (AKA) when P_REV_IN_USE ≥ 10
2.2.1
3G Authentication and Key Establishment
In this scenario, the BS receives an ROP that does not contain a MACI or not, or the
MACI does not check, or cannot be checked, and the base station initiates AKA.
MS
BS
ROP(NEW_KEY_ID, NEW_SSEQ_H, AUTHR)
a.
T Key Setup
Auth. Request Message(RANDA, AUTN)
Auth. Response Message(RES)
b.
c.
T Key Setup
RES(MACI)
d.
Figure 2: 3G Authentication when P_REV_IN_ USE ≥ 10
a. The mobile station sends an ROP. The ROP contains a new key id (NEW_KEY_ID)
and a new security sequence number (NEW_SSEQ_H) associated with the AUTHR
of the message. The mobile station also starts a Key Set-Up timer.
b. The base station invokes the procedure by selecting the next unused AV from the
ordered array of AV’s stored in the VLR. If an AV is not available in the serving
node, one (or more) AV’s are requested from the subscriber’s home system. The base
station sends the mobile station an Authentication Request Message, which contains
the random challenge RANDA, and the authentication token for network
authentication, AUTN, associated with the selected AV. Each AV contains the
following information (see [C.S0005-C], figure 2.3.12.5.2-1):
2

Authentication Random Challenge Number (RANDA)

Expected Result (XRES)

Encryption Key (CK)

Integrity Key (IK)
Reference C.S0005-D 2.3.12.5.2

UIM Authentication Key (UAK) (support this of field is optional)

Authentication Token (AUTN), which consists of the Concealed Sequence
Number (CON_SQN), the Authentication Management Function (AMF), and the
Message Authentication Code (MAC-A).
Upon reception of the Authentication Request Message, the mobile station aborts any
pending 2G key setup and the UIM computes the expected message authentication
code (XMAC). If this is not equal to the MAC-A received in the AUTN, the mobile
station enters the System Determination Substate with an encryption/message
integrity failure indication; otherwise, the UIM verifies that the sequence number
SQN received in the AUTN is in the correct range (a test of freshness).
If the UIM determines that the received SQN is not in the correct range, see section
2.2.3. If the SQN is in the correct range, the UIM computes the (IK, CK) pair and the
RES and passes the (IK, CK) pair and RES to the mobile station. The mobile station
then re-starts the Key Set-Up timer. The mobile station then associates a pending key
id NEW_KEY_ID and a pending NEW_SSEQ_H with the pending (IK, CK) pair.
The mobile station also stores (RANDA, RES, IK, CK, key id, NEW_SSEQ_H) in
case it receives, in the near future, the same retransmitted Authentication Request
Message that requires the mobile station to resend the same Authentication Response
Message. The UIM stores (IK, CK) until the next successful execution of AKA.
c. The MS sends an Authentication Response Message containing RES to the base
station. Upon reception of the Authentication Response Message, the base station
compares RES with the expected response XRES from the selected AV. If XRES
equals RES, then the authentication of the user has passed and the pending (IK, CK)
and the pending NEW_SSEQ_H can become “in use” in the base station. To ensure
the base station has agreed to switch to the pending (IK, CK), the mobile station
keeps sending the Authentication Response Message until it gets the RES that
includes a Message Authentication Code generated using the pending IK (or until the
Key Set-Up timer expires, whichever comes first)
d. The base station then confirms the AKA completion by sending an RES that includes
a Message Authentication Code generated using the pending IK to confirm the use of
the pending (IK, CK). Upon reception of this confirmation, the mobile station stops
the Key Set-Up timer and the pending (IK, CK), NEW_SSEQ_H, and key id become
“in use” for the mobile station. The mobile station stores the NEW_KEY_ID in
KEY_ID, the IK in INT_KEY[KEY_ID], and the CK in ENC_KEY[KEY_ID]. If for
any reason the keys cannot be established before the timer expires, the mobile station
enters the System Determination Substate with an encryption/message integrity
failure indication upon the expiration of the timer, which triggers re-registrations. If
after several attempts of re-registrations such that the integrity key and encryption key
still can not be established, the mobile station may reject the serving base station, and
the base station may reject serving the mobile station.
Once (IK, CK) has been established, the mobile station may start integrity protection
and encryption.
[Note: Until the keys are established, messages that are not essential to the
establishment of the key may be exchanged. These messages shall not include a
MACI. The Extended Channel Assignment Message may be sent after step ‘a’, which
allows for early traffic channel assignment. In step ‘d’, the BS sends a Security Mode
Command Message.]
2.2.1.1
Possible Outcomes of the 3G Authentication Procedure
The outcome of a 3G-authentication attempt may be:
1. The MS and BS successfully authenticate each other. The call flow completes with
successful establishment of the (IK, CK) in the MS and the BS.
2. The MS fails to authenticate the BS. This may occur if the MS fails to receive an
Authentication Request Message with a valid MAC-A (which is part of the AUTN) in
step ‘b’ and an RES message (step ‘d’) with a valid MACI before the Key Set-Up
timer expires. The MS enters the System Determination Substate, which is
experienced at the BS as a loss of radio contact.
3. The MSC/BS fails to authenticate the MS. This may occur if, in step ‘a’, the AUTHR
is invalid or, in step ‘c’, the RES does not match the XRES.
If the AUTHR is invalid or missing, the MSC/BS may reject the registration or call
attempt. In certain cases, e.g., emergency calls, the MSC/BS may allow the call to
proceed. In these cases, the BS does not send an Authentication Request Message
(i.e., does not initiate 3G authentication), but sends an RES that does not include a
MACI and the call proceeds with subsequent messages not including the MACI.
If the AUTHR is valid but the Authentication Response Message does not contain a
valid RES, the MSC/BS may reject the registration or call attempt. In certain cases,
e.g., emergency calls, the MSC/BS may allow the call to proceed. In these cases, the
call proceeds with subsequent messages not including the MACI.
2.2.2
Network Initiated AKA Procedure not Associated with an
ROP
The base station can initiate AKA at any time for any reason, for example, when (IK,
CK) expires in the mobile station. The call flow of this scenario is the same as the one in
section 2.2.1 starting at step ‘b’ and ending with a Security Mode Command in step ‘d’.
2.2.3
Synchronization Failure during AKA
MS
BS
ROP(NEW_KEY_ID, NEW_SSEQ_H, AUTHR)
a.
TKey Setup
Auth. Request Message(RANDA, AUTN)
Auth. Resync. Message(MAC-S, CON_MS_SEQ)
b.
c.
Figure 3: Synchronization failure during AKA
a. The mobile station sends an ROP. The ROP contains a new key id (NEW_KEY_ID)
and a new security sequence number (NEW_SSEQ_H) associated with the AUTHR
of the message. The mobile station also starts a Key Set-Up timer.
b. The base station invokes the procedure by selecting the next unused AV from the
ordered array of AV’s stored in the VLR. If an AV is not available in the serving
node, one (or more) AV’s are requested from the subscriber’s home system. The base
station sends the mobile station an Authentication Request Message, which contains
the random challenge RANDA, and the authentication token for network
authentication, AUTN, associated with the selected AV.
Upon reception of the Authentication Request Message, the mobile station aborts any
pending 2G key setup and the UIM computes the expected message authentication
code (XMAC). If this is not equal to the MAC-A received in the AUTN, the mobile
station enters the System Determination Substate with an encryption/message
integrity failure indication; otherwise, the UIM verifies that the sequence number
SQN received in the AUTN is in the correct range (a test of freshness).
c. The UIM determines that the received SQN is not in the correct range, and the mobile
station sends an Authentication Resynchronization Message to the base station that
includes a message authentication code for resynchronization (MAC_S) and the
concealed value of the sequence number stored in the UIM (CON_MS_SQN). The
mobile station then erases any current (IK, CK) in the mobile station and abandons
the AKA procedure.
2.2.3.1
Possible Outcomes of the Synchronization Failure
If the MS detects that the SQN receives in the AUTN is not in the correct range (in step
‘b’), the following scenarios are possible:
1. After step ‘c’, the MS [enters the System Determination Substate,] re-registers or
resends the ROP message. This time, the BS uses a newly generated AV that has the
SQN in the correct range, and the AKA procedure succeeds.
2. After step ‘c’, the BS resends the Authentication Request Message using a newly
generated AV that has the SQN in the correct range. The MS restarts the Key Set-Up
timer and responds with an Authentication Response Message including a valid RES,
and the BS sends an RES message in response to the ROP message that the MS
previously sent.
3. In certain cases, e.g., emergency calls, the MSC/BS may allow the call to proceed.
After step ‘c’, the BS sends an RES message that does not include a MACI and the
call proceeds with subsequent messages not including the MACI.
2.3
3G Reuse of Established Keys
2.3.1
The MS Powers UP and Restores the Integrity and
Encryption Keys3
Since (IK, CK) is stored in UIM even when the mobile station is powered off, it is
possible for the mobile station, when the mobile station powers on again, to try to restore
and use the stored (IK, CK) in order to avoid unnecessary AKA. However, the mobile
station will need to re-establish the crypto-sync and key id, which are not stored when the
mobile station is powered off.
MS
BS
ROP(NEW_KEY_ID, NEW_SSEQ_H, AUTHR, MACI)
TKey Setup
RES(MACI)
Security Mode Completion Order(MACI)
a.
b.
c.
Figure 4: Restoration of (IK, CK)
a. The mobile station sends an ROP that includes a Message Authentication Code
generated using the stored IK and a pending NEW_SSEQ_H. The mobile station
includes the NEW_SSEQ_H in the LAC Layer in the ROP and sets the
NEW_KEY_ID to a value selected by the mobile station to associate with this (IK,
CK). When the base station receives the ROP, it validates the MACI using its own IK
3
Reference C.S0005-D 2.3.12.5.3
stored for this mobile station and with the pending NEW_SSEQ_H provided in the
message. The mobile station also starts a Key Set-Up timer.
b. If the MACI is valid, the base station sends an RES that includes a Message
Authentication Code generated using the stored IK and NEW_SSEQ_H. The base
station resends the RES until it gets the expected Security Mode Completion Order.
When the mobile station receives the RES, the mobile station validates the MACI. If
the MACI checks, the mobile station then starts using the key id for the stored (IK,
CK), and the (IK, CK) and NEW_SSEQ_H can become “in use” in the mobile
station.
c. The mobile station then sends a Security Mode Completion Order that includes a
Message Authentication Code. Upon reception of the Security Mode Completion
Order, base station validates the MACI and if the MACI is valid, the base station
starts to set the key id for the (IK, CK) to the value selected by the mobile station (in
NEW_KEY_ID and SDU_KEY_ID), regardless of the current key id being used at
the base station. The (IK, CK) pair and NEW_SSEQ_H can become in “in use” in the
base station. The (IK, CK) pair is now successfully restored.
2.3.1.1
Possible Outcomes of the Key Restoration Procedure
The outcome of a key restoration procedure:
1. The keys are successfully restored. The call flow completes with successful
establishment of crypto-sync and key id in the MS and the BS.
2. The BS fails to validate the MACI received from the MS in step ‘a’. The BS may
initiate AKA by sending an Authentication Request Message to the MS. The call flow
in section 2.2.1 applies. The possible outcomes are listed in section 2.2.1.1. If the BS
does not support 3G authentication, the BS may send an RES message including a
MACI based on the CMEA key.
In certain cases, e.g., emergency calls, the MSC/BS may allow the call to proceed. In
these cases, the BS sends an RES that does not include a MACI and the MS does not
send the Security Mode Completion Order, and the call proceeds with subsequent
messages not including the MACI.
3. The BS successfully authenticates the MS, but the MS fails to authenticate the BS.
This may occur if, in step ‘b’, the MS fails to receive a RES message with a valid
MACI before the Key Set-Up timer expires. The MS enters the System Determination
Substate, which is experienced at the BS as a loss of radio contact.
2.3.2
ROP Using Established (IK, CK)
After the 3G integrity and encryption keys (IK, CK) have been established, the MS and
the BS may establish the authenticity of each other by validating the MACI of the
received messages.
MS
BS
ROP(AUTHR, MACI)
RES(MACI)
a.
b.
Figure 5: ROP after (IK, CK) has been established
a. The mobile station sends an ROP that includes a Message Authentication Code
generated using the stored IK. When the base station receives the ROP, it validates
the MACI.
b. The BS sends an RES that includes a Message Authentication Code generate using
the current IK. When the BS receives the RES, it validates the MACI.
2.3.2.1
Possible Outcomes of the Message Exchange Using preEstablished (IK, CK)
1. Both messages are successfully validated.
2. The BS fails to validate the MACI received from the MS in step ‘a’. The BS may
initiate AKA by sending an Authentication Request Message to the MS. The call flow
in section 2.1.1 applies. The possible outcomes are listed in section 2.2.1.1. If the BS
does not support 3G authentication, the BS may send an RES message including a
MACI based on the CMEA key.
In certain cases, e.g., emergency calls, the MSC/BS may allow the call to proceed. In
these cases, the RES message does not include a MACI, and the call proceeds with
subsequent messages not including the MACI.
3. The BS successfully authenticates the MS, but the MS fails to authenticate the BS.
This may occur if, in step ‘b’, the MS fails to receive a RES message with a valid
MACI. The MS enters the System Determination Substate, which is experienced at
the BS as a loss of radio contact.
3
Dividing up the Work between the BS and the
MSC
The cdma2000 1x air interface standard [C.S0005-C] refers to the “base station” as the
network side of the air interface, and not necessarily the BS only. In this section, we add
IOS messaging to the call flows of section 2. In each of the following call flows, <m1>,
<m2>, <m3>, etc., are used as meta-message names, which, depending on the actual
scenario (i.e., origination, page response or registration), may be mapped to existing or
new IOS messages. See section 3.1.2.1 for proposed mapping of the meta-messages to
actual IOS messages.
Note that other messages may be exchanged between the BS and the MSC and that these
call flows show only those messages that are essential to the authentication and key setup
procedures.
3.1
2G Authentication when P_REV_IN_USE ≥ 10
3.1.1
Successful 2G Authentication
MS
BS
MSC
ROP(NEW_KEY_ID,
NEW_SSEQ_H, AUTHR)
a.
<m1>(AUTHR)
b.
<m2>(CMEA_key)
c.
TKey Setup
RES(MACI)
d.
Security Mode Completion
Order(MACI)
e.
<m3>(Auth_Success_Ind)
f.
Figure 6: Successful 2G authentication
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP). The ROP contains a new key id (NEW_KEY_ID) and a
new security sequence number (NEW_SSEQ_H) associated with the AUTHR of the
message.
b. The BS sends an <m1> including the AUTHR to the MSC. The MSC validates the
AUTHR.
c. The MSC sends an <m2> message with the pending CMEA key. Upon receipt of this
message the BS forms the CIK and CCK by concatenating the CMEA key with itself.
d. The BS sends an RES to the MS that includes a MACI generated with the CIK and
the pending NEW_SSEQ_H proposed by the MS. Upon reception of the RES, the
mobile station validates the MACI. If the validation is successful, the pending (CIK,
CCK) and NEW_SSEQ_H can become “in use” in the mobile station.
e. The MS sends a Security Mode Completion Order to the base station that includes a
MACI. At this point, if the base station successfully validates the Security Mode
Completion Order that the mobile station sends, the pending (CIK, CCK) and
NEW_SSEQ_H can become “in use” in the base station.
f. The BS sends a <m3> message that indicates that the MS was successfully
authenticated. This message includes the cryptosync, which the MSC stores for future
use.
3.1.1.1
Mapping of Meta-Messages to IOS Messages
The following table shows the mapping from meta-messages to actual A1 interface
messages.
Scenario
ROP
RES
<m1>
<m2>
<m3>
Registration
Registration
Message
Registration
Accept
Order
Location
Updating
Request
Location
Updating
Accept
Authentication
Report (new)
Mobile
Origination
Origination
Message
Extended
Channel
Assignment
Message
CM
Service
Request
Assignment
Request
Assignment
Complete
Privacy
Mode
Command
Privacy Mode
Complete
Assignment
Request
Assignment
Complete
Privacy
Mode
Command
Privacy Mode
Complete
Security
Mode
Command
Message
Mobile
Termination
Page
Response
Message
Extended
Channel
Assignment
Message
Security
Mode
Command
Message
Paging
Response
Notes:
1. The BS may send the ECAM before receiving the Assignment Request message
(early traffic channel assignment), in which case the CMEA key is not available at the
time of sending this message. In this case the keys become “in use” at the MS after it
receives the Security Mode Command including the MACI.
2. The MSC may send the Assignment Request message prior to authenticating the MS.
When the MSC has authenticated the MS it sends the CMEA key in the Privacy
Mode Command message. The BS must receive the Privacy Mode Command
message in time to prevent expiration of the Key Set-Up timer at the MS.
2G Authentication — AUTHR Invalid or Missing
3.1.2
MS
BS
MSC
ROP(NEW_KEY_ID,
NEW_SSEQ_H, AUTHR)
a.
<m1>(AUTHR)
b.
<m2>(CAUSE)
c.
TKey Setup
<Rejection>
d.
Figure 7: 2G authentication — AUTHR invalid or missing
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP). The ROP contains a new key id (NEW_KEY_ID) and a
new security sequence number (NEW_SSEQ_H) associated with the AUTHR of the
message.
b. The BS sends an <m1> message including an incorrect AUTHR or no AUTHR to the
MSC. The MSC fails to validate the AUTHR.
c. The MSC sends an <m2> message including a cause for rejecting the call.
d. The BS rejects the registration or call attempt.
3.1.2.1
Mapping of Meta-Messages to IOS Messages
The following table shows the mapping from meta-messages to actual A1 interface
messages.
Scenario
ROP
<m1>
<m2>
Registration
Registration
Message
Location Updating
Request
Location Updating Reject
Mobile
Origination
Origination
Message
CM Service Request
SCCP/SUA Connection
Refused
Clear Command
Mobile
Termination
Page
Response
Message
Paging Response
SCCP/SUA Connection
Refused
Clear Command
Notes:
1. If the MSC determines that the MS is not authorized before the
SCCP/SUA connection has been established, the MSC rejects the call by
refusing the SCCP/SUA connection, otherwise the MSC clears the call by
sending the Clear Command message.
2. In certain cases, e.g., emergency calls, the MSC/BS may allow the call to
proceed. In this case the MSC will not send <m2> to the BS. The BS
proceeds with call setup and does not include a MACI in the subsequent
messages.
2G Authentication — MS Fails to Authenticate the BS
3.1.3
MS
BS
MSC
ROP(NEW_KEY_ID,
NEW_SSEQ_H, AUTHR)
a.
<m1>(AUTHR)
<m2>(CMEA_key)
TKey Setup
RES(MACI)
x
b.
c.
d.
TRES
x
<m3>(Failure_ind)
e.
Figure 8: 2G authentication — MS fails to authenticate the BS
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP). The ROP contains a new key id (NEW_KEY_ID) and a
new security sequence number (NEW_SSEQ_H) associated with the AUTHR of the
message. The mobile station also starts a Key Set-Up timer.
b. The BS sends an <m1> including the AUTHR to the MSC. The MSC validates the
AUTHR.
c. The MSC sends an <m2> message with the pending CMEA key. Upon receipt of this
message the BS forms the CIK and CCK by concatenating the CMEA key with itself.
d. The BS sends an RES to the MS that includes a MACI generated with the CIK and
the pending NEW_SSEQ_H proposed by the MS. Upon reception of the RES, the
mobile station determines that the MACI is invalid. The BS resends the RES until it
receives a valid Security Mode Completion Order from the mobile station or until it
determines that it has lost radio contact with the MS. Upon expiration of the Key SetUp timer the MS enters the System Determination Substate.
e. The BS determines that it has lost contact with the MS and sends an <m3> message
including a failure indication to the MSC.
3.1.3.1
Mapping of Meta-Messages to IOS Messages
The following table shows the mapping from meta-messages to actual A1 interface
messages.
Scenario
ROP
RES
<m1>
<m2>
<m3>
Registration
Registration
Message
Registration
Accept
Order
Location
Updating
Request
Location
Updating
Accept
Authentication
Report (new)
Mobile
Origination
Origination
Message
Extended
Channel
Assignment
Message
CM
Service
Request
Assignment
Request
Assignment
Failure
Privacy
Mode
Command
Clear Request
Assignment
Request
Assignment
Failure
Security
Mode
Command
Message
Mobile
Termination
Page
Response
Message
Extended
Channel
Assignment
Message
Security
Paging
Response
Mode
Command
Message
Privacy
Mode
Command
Clear Request
Notes:
1. The MSC sends the Clear Request message if it already has received the Assignment
Complete message. Otherwise it sends the Clear Request message.
3.2
3G Authentication
3.2.1
Successful 3G Authentication
MS
BS
MSC
ROP(NEW_KEY_ID,
NEW_SSEQ_H, AUTHR)
a.
<m1>(AUTHR)
<m2>(AV)
TKey Setup
Auth. Req. Msg. (RAND, AUTN)
c.
d.
Auth. Rsp. Msg.(RES)
RES(MACI)
b.
e.
<m3>(Auth_Success_Ind)
f.
Figure 9: Successful 3G authentication
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP). The ROP contains a new key id (NEW_KEY_ID) and a
new security sequence number (NEW_SSEQ_H) associated with the AUTHR of the
message.
b. The BS sends an <m1> including the AUTHR to the MSC. The MSC validates the
AUTHR.
c. The MSC sends an <m2> message with including the next unused AV. Upon receipt
of this message the BS calculates the IK and CK.
d. The BS sends an Authentication Request Message containing the RANDA and
AUTN. Upon receipt of this message the MS aborts any pending 2G key setup.
e. The MS sends an Authentication Response Message that includes a RES to the BS
that includes a RES. The BS compares the RES with the XRES received from the
MSC in step ‘c’.
f. The BS sends an RES message including a MACI. Upon receipt of this message, the
MS validates the MACI. The BS also sends an <m3> message to the MSC that
indicates that the MS was successfully authenticated.
3.2.1.1
Mapping of Meta-Messages to IOS Messages
The mapping from meta-messages to actual A1 interface messages is identical to to the
mapping in the case of 2G authentication; see section 3.1.1.1.
3.2.2
3G Authentication — AUTHR Invalid or Missing
See section 3.1.2.
3G Authentication — MS Fails to Authenticate the BS
3.2.3
MS
MSC
BS
ROP(NEW_KEY_ID,
NEW_SSEQ_H, AUTHR)
a.
<m1>(AUTHR)
<m2>(AV)
TKey Setup
Auth. Req. Msg.(RANDA, AUTN)
x
x
Figure 10: 3G authentication — MS fails to authenticate the BS
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP). The ROP contains a new key id (NEW_KEY_ID) and a
new security sequence number (NEW_SSEQ_H) associated with the AUTHR of the
message. The mobile station also starts a Key Set-Up timer.
b. The BS sends an <m1> message including the AUTHR to the MSC. The MSC
validates the AUTHR.
c. The MSC sends an <m2> message with including the next unused AV. Upon receipt
of this message the BS calculates the IK and CK.
d. The BS sends an Authentication Request Message containing the RANDA and
AUTN. Upon receipt of this message the MS aborts any pending 2G key setup. The
MS determines that the MAC-A in the AUTN is invalid and enters the System
Determination Substate.
e. The BS determines that it has lost contact with the MS and sends an <m3> message
including a failure indication to the MSC.
3.2.3.1
c.
d.
<m3>(Failure Ind.)
TRES
b.
Mapping of Meta-Messages to IOS Messages
The mapping from meta-messages to actual A1 interface messages is identical to the
mapping in the case of 2G authentication; see section 3.1.3.1.
e.
3G Authentication — BS Receives Invalid RES from the
MS
3.2.4
MS
BS
MSC
ROP(NEW_KEY_ID,
NEW_SSEQ_H, AUTHR)
a.
<m1>(AUTHR)
<m2>(AV)
Auth. Req. Msg. (RAND, AUTN)
c.
d.
Auth. Rsp. Msg.(RES)
RES()
b.
e.
<m3>(Auth_Failure_Ind)
<m4>(CAUSE)
Release
f.
g.
h.
TKey Setup
x
Figure 11: 3G authentication — BS receives invalid RES from the MS
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP). The ROP contains a new key id (NEW_KEY_ID) and a
new security sequence number (NEW_SSEQ_H) associated with the AUTHR of the
message.
b. The BS sends an <m1> including the AUTHR to the MSC. The MSC validates the
AUTHR.
c. The MSC sends an <m2> message with including the next unused AV. Upon receipt
of this message the BS calculates the IK and CK.
d. The BS sends an Authentication Request Message containing the RANDA and
AUTN. Upon receipt of this message the MS aborts any pending 2G key setup.
e. The MS sends an Authentication Response Message that includes a RES to the BS
that includes a RES. The BS compares the RES with the XRES received from the
MSC in step ‘c’ and determines that there is a mismatch.
f. The BS sends a <m3> message to the MSC that indicates that the MS was not
successfully authenticated. The BS may also continue exchanging messages with the
MS without including the MACI. If the MSC authorizes the MS, the call flow ends at
this step.
g. The MSC determines not to authorize the MS and sends an <m4> message to release
the call.
h. The BS initiates the release of the call.
3.2.4.1
Mapping of Meta-Messages to IOS Messages
Scenario
ROP
RES
<m1>
<m2>
<m3>
<m4>
Registration
Registration
Message
Registration
Accept
Order
Location
Updating
Request
Location
Updating
Accept
Authentication
Report (new)
NA
Mobile
Origination
Origination
Message
Extended
Channel
Assignment
Message
CM
Service
Request
Assignment
Request
Assignment
Complete
Clear
Command
Privacy
Mode
Command
Privacy Mode
Complete
Assignment
Request
Assignment
Complete
Privacy
Mode
Command
Privacy Mode
Complete
Security
Mode
Command
Message
Mobile
Termination
Page
Response
Message
Extended
Channel
Assignment
Message
Security
Mode
Command
Message
Paging
Response
Clear
Command
3G Authentication — Synchronization Failure
3.2.5
MS
BS
MSC
ROP(NEW_KEY_ID,
NEW_SSEQ_H, AUTHR)
a.
<m1>(AUTHR)
<m2>(AV)
Auth. Req. Msg. (RAND, AUTN)
c.
d.
Auth. Resync. Msg.(MAC_S,
CONS_MS_SQN)
RES()
b.
e.
<m3>(Auth_Failure_Ind)
<m4>(CAUSE)
Release
f.
g.
h.
TKey Setup
x
Figure 12: 3.2.5 3G authentication — synchronization failure
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP). The ROP contains a new key id (NEW_KEY_ID) and a
new security sequence number (NEW_SSEQ_H) associated with the AUTHR of the
message.
b. The BS sends an <m1> including the AUTHR to the MSC. The MSC validates the
AUTHR.
c. The MSC sends an <m2> message with including the next unused AV. Upon receipt
of this message the BS calculates the IK and CK.
d. The BS sends an Authentication Request Message containing the RANDA and
AUTN. Upon receipt of this message the MS aborts any pending 2G key setup.
e. The MS sends an Authentication Resynchronization Message that includes a MAC_S
and CONS_MS_SEQ to the BS.
f. The BS sends a <m3> message to the MSC that indicates that the MS was not
successfully authenticated. The BS may also continue exchanging messages with the
MS without including the MACI. If the MSC authorizes the MS, the call flow ends at
this step.
g. The MSC determines not to authorize the MS and sends an <m4> message to release
the call.
h. The BS initiates the release of the call.
3.2.5.1
Mapping of Meta-Messages to IOS Messages
The mapping is identical to the mapping in section 3.2.4.1.
3.2.6
Restoration of Keys on Power Up
BS
MS
MSC
ROP(NEW_KEY_ID,
NEW_SSEQ_H, AUTHR, MACI)
a.
<m1>(AUTHR)
b.
TKey Setup
<m2>(CK, IK)
RES(MACI)
c.
d.
Sec. Mode Compl. Order(MACI)
e.
<m3>(Success Ind)
Figure 13: Restoration of keys on power up
f.
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP) that includes a Message Authentication Code generated
using the stored IK and a pending NEW_SSEQ_H. The ROP contains a new key id
(NEW_KEY_ID) and a new security sequence number (NEW_SSEQ_H) associated
with the AUTHR of the message.
b. The BS sends an <m1> including the AUTHR to the MSC. The MSC validates the
AUTHR. The message includes an indicator that new cryptosync keys and a MACI
was received from the MS.
c. The MSC sends an <m2> message with including the current (CK, IK).
d. The BS sends an RES message including a MACI. Upon receipt of this message, the
MS validates the MACI.
e. The MS sends a Security Mode Complete Message including a MACI to the BS. The
BS validates the MACI based on the keys received from the MSC in step ‘c’.
f. The BS sends an <m3> message to the MSC that indicates that the MS was
successfully authenticated.
3.2.6.1
Mapping of Meta-Messages to IOS Messages
The mapping from meta-messages to actual A1 interface messages is identical to the
mapping in the case of 2G authentication; see section 3.1.1.1.
3.2.7
ROP Using Established (IK, CK)
BS
MS
MSC
ROP(AUTHR, MACI)
a.
<m1>(AUTHR)
b.
<m2>(CK, IK, cryptosync)
RES(MACI)
c.
d.
<m3>(Success Ind)
e.
Figure 14: Restoration of keys on power up
a. The mobile station sends Registration Message, Origination Message, or Page
Response Message (ROP) that includes a Message Authentication Code generated
using the stored IK and the current TX_EXT_SSEQ[i][KEY_ID]. The message also
includes the AUTHR.
b. The BS sends an <m1> including the AUTHR to the MSC. The MSC validates the
AUTHR. The message includes an indicator that a MACI was received from the MS.
c. The MSC sends an <m2> message with including the current (CK, IK) and the
current crytosync parameters if available. Note: When an MS goes idle, the BS may
request the MSC to store the current cryptosync parameters.
d. The BS sends an RES message including a MACI. Upon receipt of this message, the
MS validates the MACI.
e. The BS sends an <m3> message to the MSC that indicates that the MS was
successfully authenticated.
3.2.7.1
Mapping of Meta-Messages to IOS Messages
The mapping from meta-messages to actual A1 interface messages is identical to the
mapping in the case of 2G authentication; see section 3.1.1.1.
Download