LTE System Overview - additional materials
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

LTE System Overview - additional materials

  • 1,074 views
Uploaded on

Here are some additional slides from LTE System overview course delivered in September 2012 in Warsaw, Poland. ...

Here are some additional slides from LTE System overview course delivered in September 2012 in Warsaw, Poland.

Are you interested in attending top in class LTE/LTE-Advanced courses, please have a look on our course portfolio: http://is-wireless.com/trainings/lte-lte-advanced or contact us directly: info@is-wireless.com.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,074
On Slideshare
958
From Embeds
116
Number of Embeds
1

Actions

Shares
Downloads
43
Comments
0
Likes
1

Embeds 116

http://4g-university.com 116

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. EPS Security
  • 2. E-UTRAN and EPC Authentication and Key Agreement Title Procedure MME HSS First NAS Message (user identity) Authentication vector calculation (RAND; XRES; CK; IK; AUTN) Authentication data request (IMSI) Verifies AUTN Authentication data response (network authentication) (authentication vector: Calculates RES RAND; XRES; CK; IK; AUTN) User Authentication request (RAND, AUTN) User Authentication response (RES) Compares RES and XRES Calculates CK (USIM authentication) and IK Authentication Vector: • RAND – random number (one of the input parameters used to generate the other) • XRES – Expected result used by the network for USIM authentication • AUTN – authentication token used by the USIM for network authentication • CK – ciphering key • IK – integrity keyCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  • 3. E-UTRAN and EPC Key Hierarchy and Usage Title Keys Application of Keys USIM/AuC K NAS messages RRC messages Home domain specific keys Encapsulated NAS messages CK, IK (double protection) UE/HSS User IP packets KASME MME UE/MME SGWEPC specific keys KNASint Integrity KNASint KNASenc KNASenc Encryption KeNB/NH UE/eNBEUTRAN specific eNB keys KRRCint KRRCenc KUPenc KRRCint Integrity KRRCenc Encryption Encryption KUPenc Key Stored Key Key derivation Used for Derivation Used for EncryptionCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  • 4. E-UTRAN and EPC Derivation of Security Keys Title eNB eNB MME HSS Target at HO Source KeNB source NH KDF NH KeNB KeNB* KDF PHY cell ID/EARFCN DL target KeNB KDF KUPenc NAS UL Count CK, IK KRRCenc KASME KDF SN id KRRCint UP-enc-alg, RRC-enc-alg, RRC-int-alg, NAS-enc-alg, NAS-int-alg, Alg-ID Alg-ID Alg-ID Alg-ID Alg-ID KDF KDF KDF KDF KDF KUPenc KRRCenc KRRCint KNASenc KNASintCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  • 5. E-UTRAN and EPC Ciphering and Integrity Algorithms Title Protects data streams from being received by the 3rd party Ciphering EEA (EPS Encryption Algorithm) Count Bearer Direction Length Count Bearer Direction Length Key EEA (Snow3G or AES) Key EEA (Snow3G or AES) Keystream Keystream Algorithm can be changed only after HO Original stream Ciphertext stream Original stream Symetric cryptography Transmitter Receiver Integrity Allows the receiver to detect packet insertion or replacement EIA (EPS Integrity Algorithm) Count Message Direction Bearer Count Message Direction Bearer EIA (Snow3G or AES) Key EIA (Snow3G or AES) Key MAC-I/NAS-MAC XMAC-I/XNAS-MAC Compare MAC-I/NAS-MAC Transmitter ReceiverCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  • 6. Title Backup slidesCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  • 7. LTE/LTE-Advanced course portfolio List of IS-Wireless’ courses Title Contact Us: Email: info@is-wireless.com www.is-wireless.comCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com