gsm privacy attacks
play

GSM privacy attacks Karsten Nohl, nohl@srlabs.de Karsten Nohl, - PowerPoint PPT Presentation

GSM privacy attacks Karsten Nohl, nohl@srlabs.de Karsten Nohl, nohl@srlabs.de Agenda GSM attack history GSM attack vectors Attacking GSMs A 5/1 encryption Risk scenario: GSM payment GSM is global, omnipresent and wants to


  1. GSM privacy attacks Karsten Nohl, nohl@srlabs.de Karsten Nohl, nohl@srlabs.de

  2. Agenda  GSM attack history  GSM attack vectors  Attacking GSM’s A 5/1 encryption  Risk scenario: GSM payment

  3. GSM is global, omnipresent and wants to be hacked GSM 80% of encryption mobile introduced phone in 1987 … market … then 200+ disclosed countries and shown insecure in 5 billion 1994 users! Source:Wikipedia, Bitkom press statement July 28 th 2010

  4. We wanted to publicly demonstrate that GSM uses insufficient encryption Public break attempts … A5/1 shown academically broken A5/1 shown more … … and more … … and more broken. Broken with massive computation Rainbow table computation '97 '00 '03 '05 '06 '03/'08 Tables never released Too expensive Not enough known data in GSM packets … that didn't work.

  5. Industry responds to GSM cracking attempts by creating new challenges “ … the GSM call has to be identified and recorded from the radio interface. […] we strongly suspect the team developing the intercept approach has underestimated its practical complexity . A hacker would need a radio receiver system and the signal processing software necessary to process the raw radio data. ” – GSMA, Aug. ‘ 09 This talk introduces signal processing software to decode GSM calls Source: GSMA press statement

  6. Agenda  GSM attack history  GSM attack vectors  Attacking GSM’s A5/1 encryption  Risk scenario: GSM payment

  7. GSM networks are victim and source of attacks on user privacy SS7 GSM backend User data- base (HLR) Base station Phone network  GUI attacks,  Weak encryption  Over-the-air  Access to Attack phishing software private user  No network vectors installation data  Malware authentication (security optional) Covered in this lecture

  8. Network operator and manufacturer can install software on a phone Operator  Install or update software (SIM)  Update service books (BlackBerry) Encryption  Read phone book, text Messaging messages SIMToolkit Smart phone Java  Install, delete, update manufacturer any software  Read all data Source:DSTK standards WiP and S@T

  9. Telcos do not authenticate each other but leak private user data The global SS7 network “ send SMS to your subscriber x ” Telco Telco “ where in the world is your subscriber y ” “ HLR query ” can be abused Telco Telco  All telcos trust each other on the global SS7 network  SS7 is abused for security and privacy attacks; currently for SMS spam  SMS messages and caller ID can be spoofed

  10. Information leaked through SS7 network disclose user location Query Accessible to Location granularity  HLR query  Anybody on  General region (rural) the Internet to city part (urban)  Anytime  Network  Cell ID: precise interogation operators location -SMSC granularity accessible from the Internet-

  11. Agenda  GSM attack history  GSM attack vectors  Attacking GSM’s A5/1 encryption  Risk scenario: GSM payment

  12. GSM uses symmetric A5/1 session keys for call privacy Operator and Random nonce Session key phone share a Hash Master key master key to de- function rive session keys Random Random nonce nonce and session key Communi- cation A5/1- encrypted with sess- Operator Home Base station Cell phone ion key Location Register This talk discusses a technique for extrac- ting session keys

  13. A5/1 is vulnerable to pre-computation attacks Code book attacks  Code books break encryption functions with small keys  Code book provides a mapping from Secret state Output known output to secret state A52F8C02 52E91001  An A5/1 code book is 128 Petabyte 62B9320A 52E91002 and takes 100,000+ years to be C309ED0A 52E91003 computed on a PC This talk revisits techniques for computing an A5/1 code book fast and storing it efficiently

  14. Optimized A5/1 attack pre-computation takes just a few GPU-months Time on single threaded CPU: 100,000+ years 1 Parallelization  Bitslicing increases already large number of parallel computations by a factor of 256 2 Algorithmic tweaks  Compute 4 bits at once Cryptographic tweaks 3  Executing A5/1 for 100 extra clock cycles decreases key space by 85% Result: 1 month on 4 ATI GPUs *NVidia CUDA and ATI Brook GPUs are supported

  15. GPUs allow for massive parallelization of 1 code book computation Bitslicing: 1 PC with 3 graphics cards à 2 GPUs à 60 cores computes almost 100,000 A5/1 operations in parallel Source:iX 5/2010: Geheimnislos

  16. Algorithmic tweaks accelerate CUDA A5/1 2 engine significantly  Shift registers are expensive in software, while memory is cheap  Only a few state bits determine round function  Trade table lookups for shifts; optimal for CUDA: 4 shifts at once

  17. Balancing memory lookups and 2 computation maximizes throughput  Look-up tables (16kByte SRAM) enable parallelization of shifts  The tables are shared across 8 CUDA cores each 16

  18. A5/1 key space shrinks to 2 61 secret states 3 Relevant Ring with states: These states 2 64 states Rings with can be 2 61 states ignored for … … A5/1 attacks  LFSR used in older stream  Newer stream ciphers therefore ciphers preserve the full use NLFRs  The output space of NLFSR slowly output space of a function  However, they have collapses  The 100 extra A5/1 clocks in GSM statistical weaknesses shrink the output space by 85%

  19. Pre-computation tables store the code book condensed K K K E233 2F06 503A OCFE K K K DB18 B951 CAF3 77CF Collision K K K 22CB A8F3 CAF3 77CF K K K 87A4 49A6 118F B33F Longer chains := a) less storage, b) longer attack time 18 Source:c ’ t

  20. Distinguished point tables save hard disk lookups K K 7707 BEFO 6100 K K K B0F0 F415 44B2 A200 Collision K 44B2 A200 K K CA06 302F B400 Hard disk access only needed at distinguished points 19 Source:c ’ t

  21. Rainbow tables mitigate collisions K 1 K 2 K 3 E233 44B2 BBA8 1B22 Collision K 1 K 2 K 3 DB18 ODE3 44B2 5DE2 K 1 K 2 K 3 22CB 6C7A 55D2 922A K 1 K 2 K 3 87A4 11F6 362E C7D5 Rainbow tables have no mergers, but an exponentially higher attack time 20 Source:c ’ t

  22. The combination of both table optimizations provides best trade-off Start 1 2 - 5 6 7 End Distinguished points: Last 15 bits are zero 21

  23. Open source components fit together in analyzing GSM calls GnuRadio Airprobe Kraken Airprobe records data parses con- cracks A5/1 decodes from air trol data key voice Requires Requires  Software radio, ie. USRP  2TB of rainbow tables  Recommended for up-  CPU or ATI graphics card  SSD/RAID for fast cracking stream: BURX board 22

  24. Downstream can be recorded from large distances Upstream recor- ding range: Downstream 100-300m recording range: 5 – 35km 23

  25. GSM discloses more known keystream than assumed in previous attacks Known Unknown Channel Channel Assignment Timing known Frame with known or guessable plaintext Very early Early Late through 1. Empty Ack after ‘ Assignment complete ’ 2. Empty Ack after ‘ Alerting ’ Mobile “ Stealing 3. ‘ Connect Acknowledge ’ termi- bits ” nated 4. Idle filling on SDCCH (multiple frames) calls 5. System Information 5+6 (~1/sec) 6. LAPDm traffic Counting 1. Empty Ack after ‘ Cipher mode complete ’ Counting frames 2. ‘ Call proceeding ’ Network 3. ‘ Alerting ’ termi- 4. Idle filling (multiple frames) “ Stealing nated bits ” 5. ‘ Connect ’ calls 6. System Information 5+6 (~1/sec) 7. LAPDm Counting 24 Source:GSM standards

  26. Randomized padding would mitigate attack potential SDCCH trace 238530 03 20 0d 06 35 11 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238581 03 42 45 13 05 1e 02 ea 81 5c 08 11 80 94 03 98 93 92 69 81 2b 2b 2b 238613 00 00 03 03 49 06 1d 9f 6d 18 10 80 00 00 00 00 00 00 00 00 00 00 00 238632 01 61 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238683 01 81 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238715 00 00 03 03 49 06 06 70 00 00 00 00 00 04 15 50 10 00 00 00 00 0a a8 238734 03 84 21 06 2e 0d 02 d5 00 63 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238785 03 03 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b Randomization was specified in Padding in GSM Every byte of randomized 2008 (TS44.006) and should be has traditionally padding increasing attack implemented with high priority been predictable cost by two orders of Additionally needed: randomi- (2B) magnitude! zation of system information msg. 25

  27. GSM ’ s security must be overhauled Configuration tweaks and small standard modifi- Short cations render some GSM crackers useless, but do term not prevent cracking using newer tools. Upgrading GSM ’ s encryption function should be a mandatory security patch A5/1 A5/? Long term Replacing A5/1 with A5/3 may not be enough: • The A5/3 cipher is academically broken • The same master keys are used for A5/1 and A5/3 (weakest link security)

Recommend


More recommend