EPS Security
E-UTRAN and EPC   Authentication and Key Agreement Title                                    Procedure                     ...
E-UTRAN and EPC        Key Hierarchy and Usage                                                  Title                     ...
E-UTRAN and EPC   Derivation of Security Keys                                                  Title           eNB        ...
E-UTRAN and EPC   Ciphering and Integrity Algorithms                                          Title                    Pro...
Title                   Backup slidesCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All ...
LTE/LTE-Advanced course portfolio   List of IS-Wireless’ courses Title         Contact Us:         Email: info@is-wireless...
Upcoming SlideShare
Loading in...5
×

LTE System Overview - additional materials

821

Published on

Here are some additional slides from LTE System overview course delivered in September 2012 in Warsaw, Poland.

Are you interested in attending top in class LTE/LTE-Advanced courses, please have a look on our course portfolio: http://is-wireless.com/trainings/lte-lte-advanced or contact us directly: info@is-wireless.com.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
821
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
52
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

LTE System Overview - additional materials

  1. 1. EPS Security
  2. 2. E-UTRAN and EPC Authentication and Key Agreement Title Procedure MME HSS First NAS Message (user identity) Authentication vector calculation (RAND; XRES; CK; IK; AUTN) Authentication data request (IMSI) Verifies AUTN Authentication data response (network authentication) (authentication vector: Calculates RES RAND; XRES; CK; IK; AUTN) User Authentication request (RAND, AUTN) User Authentication response (RES) Compares RES and XRES Calculates CK (USIM authentication) and IK Authentication Vector: • RAND – random number (one of the input parameters used to generate the other) • XRES – Expected result used by the network for USIM authentication • AUTN – authentication token used by the USIM for network authentication • CK – ciphering key • IK – integrity keyCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  3. 3. E-UTRAN and EPC Key Hierarchy and Usage Title Keys Application of Keys USIM/AuC K NAS messages RRC messages Home domain specific keys Encapsulated NAS messages CK, IK (double protection) UE/HSS User IP packets KASME MME UE/MME SGWEPC specific keys KNASint Integrity KNASint KNASenc KNASenc Encryption KeNB/NH UE/eNBEUTRAN specific eNB keys KRRCint KRRCenc KUPenc KRRCint Integrity KRRCenc Encryption Encryption KUPenc Key Stored Key Key derivation Used for Derivation Used for EncryptionCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  4. 4. E-UTRAN and EPC Derivation of Security Keys Title eNB eNB MME HSS Target at HO Source KeNB source NH KDF NH KeNB KeNB* KDF PHY cell ID/EARFCN DL target KeNB KDF KUPenc NAS UL Count CK, IK KRRCenc KASME KDF SN id KRRCint UP-enc-alg, RRC-enc-alg, RRC-int-alg, NAS-enc-alg, NAS-int-alg, Alg-ID Alg-ID Alg-ID Alg-ID Alg-ID KDF KDF KDF KDF KDF KUPenc KRRCenc KRRCint KNASenc KNASintCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  5. 5. E-UTRAN and EPC Ciphering and Integrity Algorithms Title Protects data streams from being received by the 3rd party Ciphering EEA (EPS Encryption Algorithm) Count Bearer Direction Length Count Bearer Direction Length Key EEA (Snow3G or AES) Key EEA (Snow3G or AES) Keystream Keystream Algorithm can be changed only after HO Original stream Ciphertext stream Original stream Symetric cryptography Transmitter Receiver Integrity Allows the receiver to detect packet insertion or replacement EIA (EPS Integrity Algorithm) Count Message Direction Bearer Count Message Direction Bearer EIA (Snow3G or AES) Key EIA (Snow3G or AES) Key MAC-I/NAS-MAC XMAC-I/XNAS-MAC Compare MAC-I/NAS-MAC Transmitter ReceiverCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  6. 6. Title Backup slidesCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  7. 7. LTE/LTE-Advanced course portfolio List of IS-Wireless’ courses Title Contact Us: Email: info@is-wireless.com www.is-wireless.comCopyright by Innovative Solutions. All rights reserved.Copyright by IS-Wireless. All rights reserved. www.is-wireless.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×