We use cookies to improve your experience with our site.

针对CDMA蜂窝网络认证协议的侧信道分析

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks

  • 摘要: 时分多址(Time-division multiple access,TDMA)和码分多址(code-division multiple access,CDMA)是两种主要的用在数字蜂窝网络中的技术。TDMA网络中的认证协议被证明易受到侧信道分析(side-channel analysis,SCA)的威胁,可利用侧信道分析方法成功恢复出未做侧信道防护的手机卡(subscriber identity module,SIM)中的认证密钥。由于CDMA网络中的认证协议与TDMA网络中的认证协议不同,已提出的在TMDA上的侧信道分析方法无法应用在CDMA网络上。为了填补该项空白,我们深入研究了CDMA网络中的两种认证协议,即基于蜂窝认证与语音加密(cellular authentication and voice encryption,CAVE)的认证协议及基于认证与密钥协商(authentication and key agreement,AKA)的认证协议。这两种协议分别使用CAVE算法和安全散列算法1(secure hash algorithm 1,SHA-1)算法作为他们的基本密码算法模块。我们发现了这两种散列类算法的易受侧信道攻击的脆弱点,提出了完整的基于侧信道分析方法的认证密钥恢复方案。我们在微控制器及商业CDMA手机卡上验证了我们提出的新攻击方案,可使用少量功耗曲线在短时间内完全恢复认证密钥。

     

    Abstract: Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise to a series of powerful SCA-based attacks against unprotected subscriber identity module (SIM) cards. CDMA networks have two authentication protocols, cellular authentication and voice encryption (CAVE) based authentication protocol and authentication and key agreement (AKA) based authentication protocol, which are used in different phases of the networks. However, there has been no SCA attack for these two protocols so far. In this paper, in order to figure out if the authentication protocols of CDMA networks are sufficiently secure against SCA, we investigate the two existing protocols and their cryptographic algorithms. We find the side-channel weaknesses of the two protocols when they are implemented on embedded systems. Based on these weaknesses, we propose specific attack strategies to recover their authentication keys for the two protocols, respectively. We verify our strategies on an 8-bit microcontroller and a real-world SIM card, showing that the authentication keys can be fully recovered within a few minutes with a limited number of power measurements. The successful experiments demonstrate the correctness and the effectiveness of our proposed strategies and prove that the unprotected implementations of the authentication protocols of CDMA networks cannot resist SCA.

     

/

返回文章
返回