Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

While GSM is ubiquitously deployed, 3rd and 4th generation technologies such as

ID: 3803781 • Letter: W

Question

While GSM is ubiquitously deployed, 3rd and 4th generation technologies such as UMTS and LTS are wide spread today. This question explores some of the security aspects of 3G/4G systems, especially as they relate to GSM. Universal Mobile Telecommunications System (UMTS) is a 3G system based on the GSM standard. The authentication and key agreement procedure in UMTS is similar to GSM, with some notable differences: •The security algorithms and protocols used are negotiated between the operator and the mobile station during authentication. •Both a cipher key and an integrity key are derived during authentication. •In addition to the RAND challenge, the mobile network sends an AUTN message that contains a Message Authentication Code (MAC). Research the UMTS authentication and key agreement (AKA) to answer the following questions:

(c) Xavier Breath believes that both the AUTN and the integrity-protected protocol negotiation messages are required to ensure mutual authentication and prevent Manin-the-Middle attacks. Explain why, or argue why not.

(d) Xavier further argues that the UMTS authentication protocol prevents downgrade attacks (for instance where the mobile station is instructed to use no encryption). Explain why Xavier is correct or incorrect. Long Term Evolution (LTE) is a popular 4G system enjoying increased deployment.

(e) Briefly describe at least two differences between EPS-AKA (LTE’s authentication and key agreement) and UMTS’s AKA.

Explanation / Answer

A security token is also known as authentication token it is a small hardware device that the proprietor carries to authorize access to network repair.the machine may be in the form of a smart card or may be embedded in a usually used thing such as a key fob safety tokens give an extra stage of pledge through a method identified as two factor verification: the user has a personal identification number(PIN),which authorize them as the proprietor of that exacting device,the device that display a figure which exclusively identify the user to the repair allow them to login the recognition number for every user is changed regularly,typically every five minutes.

3GPP stipulation are in print free of charge equal to four times a year next periodical technical specification group (TSG) plenary meeting at each TSG round specify can be: