SlideShare a Scribd company logo
1 of 25
2G[1] and 3G[2] Security
&
Charging, Data Rating, Authentication Concepts
by Valeh Sabziyev
2G Security
Identity Confidentiality
MS Authentication
A3 algorithm
Information Confidentiality
A8 & A5 algorithms
2G Authentication Procedure
2G Authentication Procedure
2G Ciphering Key Setting
2G Ciphering
3G Security
Identity Confidentiality
MS and Network Authentication
f1, f2, f3, f3, f5 functions
Information Confidentiality
f8 function
Information Integrity
f9 function
3G Vector Generation
3G Authentication Vectors
3G Authentication Vectors
Security mode setup
Integrity Function
Ciphering Function
f9[3]
f8[3]
KASUMI[4]
- 8-round Feistel cipher
- 64-bit data block
- 128-bit key
Data rating, charging, RADIUS
authentication
RADIUS protocol
- On top of UDP
- Client-Server Model
- Uses shared secret
- Extensible
RADIUS message format[5]
Access Request
Access Response
DIAMETER Message Format[6]
Credit Control Request
References
1. 3GPP TS 43.020, Security Related Network Functions
2. ETSI TS 133 102, 3G Security, Security Architecture
3. 3GPP TS 35.201, f8 and f9 Specifications
4. 3GPP TS 35.202, KASUMI Specifications
5. RFC 2865, Remote Authentication Dial-In User Service
6. RFC 3588, Diameter Base Protocol
thanks for your
time.

More Related Content

Similar to OJT 2G and 3G Security

Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aRizal Broer
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET Journal
 
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfNeed key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfarkleatheray
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsIRJET Journal
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfBenAissaTaher1
 
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET Journal
 
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureBrad Brown
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10Rizal Broer
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09tverbeck
 
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to TendenciesOramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to TendenciesLuis Lobo e Silva
 
Basic Network Support Certification
Basic Network Support CertificationBasic Network Support Certification
Basic Network Support CertificationVskills
 
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aRizal Broer
 

Similar to OJT 2G and 3G Security (20)

Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
 
CLOUD ZERO TRUST MODEL
CLOUD ZERO TRUST MODELCLOUD ZERO TRUST MODEL
CLOUD ZERO TRUST MODEL
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
Need key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdfNeed key terms and multiple choice answered Designers created WTLS a.pdf
Need key terms and multiple choice answered Designers created WTLS a.pdf
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
 
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
 
Security model evaluation of 3 g
Security  model  evaluation  of  3 gSecurity  model  evaluation  of  3 g
Security model evaluation of 3 g
 
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
 
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to TendenciesOramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
Oramix at IV FÓRUM ARCTEL-CPLP 2013 - Aligned to Tendencies
 
Basic Network Support Certification
Basic Network Support CertificationBasic Network Support Certification
Basic Network Support Certification
 
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
 

OJT 2G and 3G Security