Article Link
Collect
Submit Manuscript
Show Outline
Outline
Abstract
Keywords
Electronic Supplementary Material
References
Show full outline
Hide outline
Regular Paper

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks

School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
ZhiXun Crypto Testing and Evaluation Technology Co., Ltd., Shanghai 200240, China
Crypto Group, Electrical Engineering Department, Institute of Information and Communication Technologies Catholic University of Louvain, Louvain-la-Neuve B-1348, Belgium
Shanghai Viewsource Information Science and Technology Co., Ltd, Shanghai 200240, China
Show Author Information

Abstract

Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise to a series of powerful SCA-based attacks against unprotected subscriber identity module (SIM) cards. CDMA networks have two authentication protocols, cellular authentication and voice encryption (CAVE) based authentication protocol and authentication and key agreement (AKA) based authentication protocol, which are used in different phases of the networks. However, there has been no SCA attack for these two protocols so far. In this paper, in order to figure out if the authentication protocols of CDMA networks are sufficiently secure against SCA, we investigate the two existing protocols and their cryptographic algorithms. We find the side-channel weaknesses of the two protocols when they are implemented on embedded systems. Based on these weaknesses, we propose specific attack strategies to recover their authentication keys for the two protocols, respectively. We verify our strategies on an 8-bit microcontroller and a real-world SIM card, showing that the authentication keys can be fully recovered within a few minutes with a limited number of power measurements. The successful experiments demonstrate the correctness and the effectiveness of our proposed strategies and prove that the unprotected implementations of the authentication protocols of CDMA networks cannot resist SCA.

Electronic Supplementary Material

Download File(s)
jcst-34-5-1079-Highlights.pdf (561.6 KB)
jcst-34-5-1079_ESM.pdf (561.6 KB)

References

[1]

Shankar P M. Introduction to Wireless Systems. Wiley, 2002.

[2]

Sauter M. From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband (1st edition). Wiley, 2011.

[3]
Bertoni G, Daemen J, Peeters M, van Assche G. Keccak. In Proc. the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2013, pp.313-314.
[4]

Steele R, Lee C C, Gould P. GSM, cdmaOne and 3G Systems (1st edition). Wiley, 2001.

[5]

Mangard S, Oswald E, Popp T. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2007.

[6]
Rao J R, Rohatgi P, Scherzer H, Tinguely S. Partitioning attacks: Or how to rapidly clone some GSM cards. In Proc. the 2002 IEEE Symposium on Security and Privacy, May 2002, pp. 31-41.
[7]
Zhou Y, Yu Y, Standaert F X, Quisquater J J. On the need of physical security for small embedded devices: A case study with COMP128-1 implementations in SIM cards. In Proc. the 17th International Conference on Financial Cryptography and Data Security, April 2013, pp.230-238.
[8]
Liu J, Yu Y, Standaert F X, Guo Z, Gu D, Sun W, Ge Y, Xie X. Small tweaks do not help: Differential power analysis of MILENAGE implementations in 3G/4G USIM cards. In Proc. the 20th European Symposium on Research in Computer Security, September 2015, pp.468-480.
[9]
Maghrebi H, Bringer J. Side-channel analysis of the TUAK algorithm used for authentication and key agreement in 3G/4G networks. In Proc. the 15th International Conference on Smart Card Research and Advanced Applications, November 2016, pp.39-56.
[10]
Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In Proc. the 6th International Workshop on Cryptographic Hardware and Embedded Systems, August 2004, pp.16-29.
[11]
Kocher P, Jaffe J, Jun B. Differential power analysis. In Proc. the 19th Annual International Cryptology Conference, August 1999, pp.388-397
Journal of Computer Science and Technology
Pages 1079-1095
Cite this article:
Zhang C, Liu J-R, Gu D-W, et al. Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks. Journal of Computer Science and Technology, 2019, 34(5): 1079-1095. https://doi.org/10.1007/s11390-019-1961-5
Metrics & Citations  
Article History
Copyright
Return