Air-Interface Application Layer Security: A follow up to C20-2006-327-011 Source: Lucent Technologies, Inc. S.Patel, G.Sundaram, R.Rance, S.Mizikovsky,

Slides:



Advertisements
Similar presentations
12/6/20041 TITLE: Basic Multicarrier EVDV operation SOURCE: Srinivasan
Advertisements

Inter-AGW HO Notice Contributors grant a free, irrevocable license to 3GPP2 and its Organization Partners to incorporate text or other copyrightable material.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. grant a free, irrevocable license to 3GPP2 and its Organizational Partners to.
TSG-C Title: CSNA-Lite L2 Ack issue ____________________________________________________________________________________________________________________.
IP Connectivity for E911 in HRPD/PDS Networks Page 1 IP Connectivity for Emergency Calls in HRPD/PDS Networks 3GPP2 Meeting, 1/07 IP Connectivity for Emergency.
XHRPD Example Scenario for MSS Masa Shirota Qualcomm Inc. July 15, GPP2 Dalian Meeting Recommendation: FYI Notice QUALCOMM Incorporated grants a.
3GPP2 A r0 3GPP2 C xxxr0 TSG-A WG3 and TSG-C WG2 Title: HRPD Redirect on EPC Unavailable Source: Mike DolanAlcatel-Lucent Dave.
1 IP Service Authorization Support and Mobility Selection for X.S0011-E Source: QUALCOMM Inc.: Masa Shirota, George Cherian, Jun Wang,
1 UATI-IP address mapping Peerapol Tinnakornsrisuphap David Ott Qualcomm.
1 Title: TDF support in cdma2000 1x and HRPD Networks Sources: China Telecom, ZTE, Huawei Contact: CT: Heng Nie ( ), Congjie Mao(
May 14, 2007 Violeta Cakulev, Mike Dolan, Frank Alfano, Nancy Lee - Alcatel-Lucent ABSTRACT: This contribution discusses the benefits on several features.
1 Title: Need for the Message Integrity of User traffic Abstract: From both: competitive and security standpoints, UMB standard should add the option of.
ABSTRACT: This contribution proposes the HRPD-WiMAX handoff solution. TITLE: HRPD-WiMAX Handoff TSG-A WG4 RECOMMENDATION: Review and Adopt Samsung Electronics.
1 cdma2000® Data Service Transition to NULL Support Jun Wang Ravi Patwardhan June 5, 2003 Recommendation -
Inline Integrity plus Encryption Source: Lucent Technologies, Inc. Sarvar Patel and Ganesh Sundaram Recommendation: Review and adopt Lucent Technologies.
© Alcatel-Lucent | M2M Numbering | April 12, GPP2 M2M TITLE Numbering in 3GPP2 for M2MSOURCE Mike Dolan, Alcatel-Lucent, Mike.
Revised Solution for Device Binding Revised from S GPP2 TSG-SX WG4 SX Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Broadcast Area Based Management for BCMCS Quanzhong Gao Weidong Wu 04/05/2005.
Security Framework for (e)HRPD 1 S GPP2 TSG-S WG4 Source: QUALCOMM Incorporated Contact(s): Anand Palanigounder
IP Packet Tunneling and Routing in UMB March 26 th, 2007 Qualcomm/Alcatel-Lucent/Hitachi Notice Contributors grant a free, irrevocable license to 3GPP2.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
Broadcast/Multicast Priority List JUNHYUK SONG SAMSUNG Incorporated grants a free, irrevocable license to 3GPP2 and its Organization Partners to incorporate.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
1 SeGW Certificate profile (Revised) 3GPP2 TSG-S WG4 /TSG-X WG5 (PDS) S X xx Source: QUALCOMM Incorporated Contact(s): Anand.
Page 1 January 16, 2008 Source: 3GPP2 TSG-S WG4 (Security) Contacts: Anand Palanigounder, Chair, TSG-S WG4 ( Zhibi Wang,
Proposed 1x Device Binding Solution Based on SX & SX GPP2 TSG-SX WG4 SX Source(s): Qualcomm Incorporated.
Proposed Solution for Device Binding 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
May 12, 2008 Alcatel Lucent, Cisco, Motorola, Nortel, Verizon ABSTRACT: Proposed is additional key hierarchy and derivation for EPS access over eHRPD.
May, 2009 C2 – Company Confidential SOURCE: Simon Mizikovsky, Ganesh Sundaram, Zhibi Wang, Jialin Zou CONTACT:
1 Authentication and User Profile April 24, 2007 Jun Wang QUALCOMM Inc. Notice Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
HRPD Connection Layer Protocols for Inter-technology Handoff March 31 st, 2008 Peerapol Tinnakornsrisuphap
Huawei Technologies 1 C xxx Initial Power Setting of Additional Reverse Carriers Lu, Jianmin
Title: Type: Arial Bold Size : 32-36pt Color : The theme blue Subtitle: Type : Arial Size : 24pt Color: The theme gray 1 TSG-AC WG2 HRPD/eHRPD enhancements.
Dec GPP2 TSG-X PDS 1 BCMCS Higher-Layer Encryption Raymond Hsu, Jun Wang Qualcomm Inc. Dec Notice QUALCOMM Incorporated grants a free, irrevocable.
3GPP2 SX r0 TSG-SX WG3 - PDS Title: Overview of the 3GPP TFT change and Possible Solutions Source: TSG-SX WG3 Chair and Vice Chair Abstract:
ABSTRACT: This contribution introduces the inter-RAT fast handover solution. TITLE: Inter-Radio Access Technology Fast Handover TSG-A WG4 RECOMMENDATION:
UMB AIS Document Structure Ravi Patwardhan, Qualcomm QUALCOMM Incorporated grants a free, irrevocable license to 3GPP2 and its Organizational.
HRPD Network Load Balance ZTE grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable material.
ABSTRACT: This contribution proposes the HRPD-WiMAX handoff solution. TITLE: HRPD-WiMAX Handoff TSG-A WG4 RECOMMENDATION: Review and Adopt Samsung Electronics.
Supporting Local Breakout in HRPD Femto Peerapol Tinnakornsrisuphap Qualcomm Doug Knisely
August 25, 2008 Alcatel Lucent ABSTRACT: 1x System Reliability is important in the face of major events, such as an earthquake. There are several ways.
3GPP2 Network Evolution: UMB->HRPD Handoff October 16, 2007 Qualcomm Inc. Contact: Jun Wang Notice Contributors grant a free, irrevocable license to 3GPP2.
3GPP2 TSG-C SWG1.4 TITLE: Clarifications for IOTA Proposal SOURCE: Nick J. Mazzarella 1960 Lucent Lane Naperville, IL (630)
X xxx ZTE Discussion on cdma2000 Charging with PCC Title: Inter-RAT RAN information management protocol Stack Sources: NSN Contact: Scott Marin,
3GPP2 X xxx Title: Subscriber QoS Profile Support in eHRPD System Sources: China Telecom, ZTE Contact: CT: Peirong Li Wenyi.
Comment to Limited Idle Mode Nortel Networksgrants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable.
M2M Enhancement for HRPD Rev C VIA Telecom grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable.
Access Procedure Enhancement for HRPD Rev C VIA Telecom grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text.
EAP over HRPD Comments Qualcomm, Inc. Vidya Narayanan, Dondeti, Lakshminath, Jun Wang, Pete Barany Notice: QUALCOMM Incorporated grants a free, irrevocable.
Tunneling Protocol Structures for UMB to HRPD Interworking Linhai He Peerapol Tinnakornsrisuphap
X xx CT+ZTE PCC for cdma2000 MS Init Call Flows 1 1 Title: PCC for cdma2000 – MS-Init Call Flow Example Sources: CTC, ZTE Contact: CHINA TELECOM.
Improved CDMA Mobile Hashing Lucent Technologies grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other.
TSG-C SWG2.3 Source: Lucent Technologies Contact: Krishna Balachandran Kenneth Budka Joseph Kang
TSG-C SWG2.3 BCMCAHG Source: Lucent Technologies Contact: Krishna Balachandran Kenneth Budka Joseph Kang
1 Notice (c) ZTE CORPORATION. ZTE Corporation, grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other.
1 3GPP2 A TITLE: TITLE: Energy Saving Mode Architecture ThoughtsSOURCE Scott Marin,
0 软交换应用的探讨 赵慧玲 2004 年 05 月 Dynamically Coverage Management By Caiqin Zhu(Catherine Zhu) China Telecom Apr © GPP2 China Telecom.
1 Subject:Draft Responses to BBF Comments re. cdma2000 MO Preview Date: 25 January 2010 Source: Doug Knisely TSG-X FMOAHG Co-chair, BBF Liaison Contact:
Adding LTE-1x CSFB IOS specification in 3GPP2 Sources: China Telecom, Contact: Li Wenyi ABSTRACT: This contribution is to analyze the.
C Seoul, Korea Lucent Technologies Inc. grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text.
1 OMP for Dual Rx AT in LTE tunneled mode Contributors grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text.
Signaling Packet Routing for Layer 3 approach in UMB-HRPD/1x interworking KDDI Corporation, Tsunehiko Chiba, Osamu.
C August 19, 2003 Page 1 SMS Push Teleservice Nobuyuki Uchida QUALCOMM Incorporated Notice ©2003 QUALCOMM Incorporated. All rights reserved.QUALCOMM.
1 Title: 1xEV-DO Forward Link Enhancement Proposal Source: Naga Bhushan, QUALCOMM Incorporated , Date: April 14, 2003 Recommendation:
Benefits of eBS for UMB Qualcomm Inc. January 08, 2007 Notice Contributors grant a free, irrevocable license to 3GPP2 and its Organization Partners.
0 3GPP2 TSG-C LTE Activities Byung K. Yi TSG-C Chair ©2005 LG Electronics, Inc. LG Electronics, Inc. grants a free, irrevocable license to 3GPP2 and its.
1 MSI (Multiple Service Instances) Ravindra Patwardhan QUALCOMM Incorporated Review and approve for D Notice QUALCOMM.
1 IP Service Authorization Support and Mobility Selection Source: QUALCOMM Inc.: Masa Shirota, George Cherian, Jun Wang,
C R1 1 3GPP2 TSG-C WG3 TITLE : FL BRCH Full Buffer Simulation Results in AWGN for Calibration SOURCE: KDDI Corporation Toshihiko Komine,
TSG-A WG4 TITLE: GRE L2TPv3 Comparison SOURCE:
Presentation transcript:

Air-Interface Application Layer Security: A follow up to C Source: Lucent Technologies, Inc. S.Patel, G.Sundaram, R.Rance, S.Mizikovsky, Z.Wang Recommendation: Discuss and adopt Lucent Technologies grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable material contained in the contribution and any modifications thereof in the creation of 3GPP2 publications; to copyright and sell in Organizational Partner's name any Organizational Partner's standards publication even though it may include all or portions of this contribution; and at the Organizational Partner's sole discretion to permit others to reproduce in whole or in part such contribution or the resulting Organizational Partner's standards publication. Lucent Technologies is also willing to grant licenses under such contributor copyrights to third parties on reasonable, non-discriminatory terms and conditions for purpose of practicing an Organizational Partner’s standard which incorporates this contribution. This document has been prepared by Lucent Technologies to assist the development of specifications by 3GPP2. It is proposed to the Committee as a basis for discussion and is not to be construed as a binding proposal on Lucent Technologies. Lucent Technologies specifically reserves the right to amend or modify the material contained herein and to any intellectual property of Lucent Technologies other than provided in the copyright statement above.

Motivation  This is a follow up to contribution C  Introducing Link Layer Security functions above RLP  Motivation 1.Bandwidth savings due to reduced overheads Cryptosync overhead is reduced to zero bytes Explicit Message Authentication - only one tag per application packet rather than many tags. Implicit Message Authentication - without explicit tags 2.Minimizes encryption/decryption in multiple places The encrypted data can be moved around without requiring a need to secure the data and shuttle keys around. 3.Encryption can be implemented separately from lower layer functions 4.Pre-encryption possible application data can be pre-encrypted rather than waiting for lower layers to schedule and create cryptosync.

Overview  Encryption Overview –Three choices for encryption - one selected during connection setup: 1.Null encryption 2.Simple encryption 3.Encryption with Implicit Message Authentication (EIMA)  Message Authentication Overview –Choices for explicit message authentication and tag sizes – selected during connection setup: 1.Null authentication 2.Explicit Message Authentication –Tag sizes negotiated to be 32, 64, or 96.

Cryptosync  A Byte Number based cryptosync used for byte oriented RLP –Transmitter: 1) keeps track of the bytes seen at the security layer and 2) uses them to create cryptosync for encryption and message authentication tag creation. –Receiver: 1) the RLP byte number received in the RLP packet is used at the security layer to track the byte number and 2) create the crytposync for decryption and message authentication tag verification.  A Packet Number based cryptosync used for packet oriented RLP –Transmitter: 1) keeps track of packets seen at the security layer and 2) uses them to create cryptosync for encryption and message authentication tag creation. –Receiver: 1) the RLP packet number received in the RLP packet is used at the security layer to track the packet number and 2) create the cryptosync for decryption and message authentication tag verification.

Simple Encryption: for Byte oriented flows  Sender –Application packet is broken into 128-bit blocks and encrypted one block at a time. –Each block is stream ciphered (XORed) with mask bits created for that block. Mask bits are created by running AES with a cryptosync. –The cryptosync is a flow_id concatenated with the current Block Number. The block number is ((byte# of first byte)/16) –Block number is a large counter value of say 56 (or 64) bits  Receiver –Received RLP Byte Sequence Number is used to track the Bytes received at the security layer. Note that RLP sequence number will start to recycle after (or ) blocks are transmitted, after which a virtual counter is incremented. –Block Number is created from the Byte Number and used to create the cryptosync for that block, which in turn is used to create the mask bits to decrypt the ciphertext 128 bit block. –Decryption proceeds one block at a time.

Simple encryption: for Packet oriented flows  Encryption is similar to existing standard.  Security layer tracks the number of packets seen, and knows the length of the current application packet to be encrypted.  Mask bits for the entire packet are created using existing AES encryption mode  Cryptosync is flow_id concatenated with Packet Number. –An internal incrementing 32-bit counter is used as part of the AES input to create mask bits beyond one block. Again same as existing AES mode of encryption in standard.  At receiver, the received RLP Sequence Number is used along with a virtual part to create a Packet Number input to the cryptosync. –Mask bits needed for the length of the packet are created to decrypt the packet.

Explicit Message Authentication  Cryptosync –For packet oriented flow, the cryptosync is same as for encryption. –For byte oriented flow, the first block number in the application packet is used for cryptosync.  Message authentication on entire application layer packet –Dramatically reduces overheads due to tags E.g., entire IP packet, rather than RLP segment  Message authentication tag is: –EHMAC_SHA( Cryptosync | message )

Encryption with Implicit Message Authentication (EIMA)  Mode of encryption that can provide message authentication in certain cases without incurring the bandwidth overhead of tags.  C = AX+B –X is message and C is ciphertext. –A and B are two streams of bits created by running AES twice with ‘0’|cryptosync and ‘1’|cryptosync respectively. –Basic block size is 16 bits, i.e. operations are done over GF(2 16 ) –Some performance details on next slide.  A malicious change in ciphertext would cause the decrypted text to be randomly changed. –If there are redundancy or error check in the message, e.g. UDP/TCP checksum, then its verification would fail, and the message would be rejected by the application. –Moreover, tampering with VoIP and other multimedia packets would result in noise at the receiver (implicitly rejected by the user).

AX+B  Calculation –Encryption involves one multiplication in GF(2 16 ) –Decryption involves one inversion in GF(2 16 ), one multiplication in GF(2 16 ). X = (C + B)A -1  Inversion can be done using two multiplication in GF(2 16 ) using Itoh’s method and normal basis.  Multiplication in GF(2 16 ) can be done efficiently by converting into GF(2 8 ) multiplications. –Multiplications for GF(2 8 ) can be done efficiently using lookup tables.  24 bit blocks –A 24 bit block may be created for a short 24 bit message or if a long message is not a multiple of 16 bits. –Do AX+B over GF(2 24 ) Calculations only slightly more complex than GF(2 16 ) 24 bits blocks happen rarely.