+ All Categories
Home > Documents > 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving...

5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving...

Date post: 03-Sep-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
18
5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019
Transcript
Page 1: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

5G and other stories:evolving security in an evolving world

Steve Babbage20 June 2019

Page 2: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public

Evolution #1

2

Page 3: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public3 20 June 2019

First generation analog phones

Page 4: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public

GSM: cryptography in mass market telecoms

20 June 20194

• Cryptographic authentication of the subscriber• Encryption of calls / texts on the radio linkBut …

A5/1, A5/2 (initially)64-bit key

One-way authentication

Homenetwork

Visitednetwork

Weak “example” algorithmCOMP-128

Page 5: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public

Evolution of security

5

1G 2G 3G

Tune in and listen64-bit cipher key Increased to 128 bits

Initial encryption algorithms (stronger ones now widely deployed)

Full strength public algorithms

Record and cloneOne-way authentication Mutual authentication,

tamper-proof signallingAuthentication and key agreement algorithms

Much better example algorithm

Page 6: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public6 20 June 2019

What’s left for attackers?

X

Page 7: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public7 20 June 2019

5G versus tracking

IMSI catcher (Stingray)

IMSI sniffer

Page 8: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public8 20 June 2019

The changing endpoint

Page 9: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public9 20 June 2019

User plane integrity protection

Control plane (signalling)

User plane (content)

Encrypt

EncryptIntegrity protect

Page 10: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public10 20 June 2019

User plane integrity protection

Control plane (signalling)

User plane (content)

Encrypt

EncryptIntegrity protect

Control plane (signalling)

User plane (content)

Rupprecht et al, https://alter-attack.net/

Integrity protect

Page 11: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public11 20 June 2019

Quantum

Page 12: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public12 20 June 2019

Latency

Mobile network Internet

Mobile network “Cloud” applications hosted on mobile operator sites

- more exposed sites?

Network info or capabilities exposed to applications

5G radio latency

Page 13: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public13 20 June 2019

The SIM

• A miniature “hardware security module”

• Well made SIMs, with strong algorithms, remain highly resistant to attack

Page 14: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public14 20 June 2019

Massive IoT

Image from ETSI slides by Dr Klaus Vedder, G&D

Page 15: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public15 20 June 2019

Interconnect

A

C

D

B

E

A

C

D

B

E

Visited network core Home network core

SEPP SEPP

Service Based Architecture rather than point to point

interfaces

Page 16: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public16 20 June 2019

Virtualisation

Image credit: Vijay Sharma (Techplayon)

Page 17: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

C1 Public

5G security hits the headlines

Page 18: 5G and other stories: evolving security in an evolving world€¦ · 5G and other stories: evolving security in an evolving world Steve Babbage 20 June 2019. C1 Public Evolution #1

Questions?

18 20 June 2019


Recommended