首页 | 官方网站   微博 | 高级检索  
     


Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks
Authors:Chi Zhang  Jun-Rong Liu  Da-Wu Gu  Wei-Jia Wang  Xiang-Jun Lu  Zheng Guo  Hai-Ning Lu
Affiliation:1.School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China;2.ZhiXun Crypto Testing and Evaluation Technology Co., Ltd., Shanghai 200240, China;3.Crypto Group, Electrical Engineering Department, Institute of Information and Communication Technologies Catholic University of Louvain, Louvain-la-Neuve B-1348, Belgium;4.Shanghai Viewsource Information Science and Technology Co., Ltd, Shanghai 200240, China
Abstract:Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise to a series of powerful SCA-based attacks against unprotected subscriber identity module (SIM) cards. CDMA networks have two authentication protocols, cellular authentication and voice encryption (CAVE) based authentication protocol and authentication and key agreement (AKA) based authentication protocol, which are used in different phases of the networks. However, there has been no SCA attack for these two protocols so far. In this paper, in order to figure out if the authentication protocols of CDMA networks are sufficiently secure against SCA, we investigate the two existing protocols and their cryptographic algorithms. We find the side-channel weaknesses of the two protocols when they are implemented on embedded systems. Based on these weaknesses, we propose specific attack strategies to recover their authentication keys for the two protocols, respectively. We verify our strategies on an 8-bit microcontroller and a real-world SIM card, showing that the authentication keys can be fully recovered within a few minutes with a limited number of power measurements. The successful experiments demonstrate the correctness and the effectiveness of our proposed strategies and prove that the unprotected implementations of the authentication protocols of CDMA networks cannot resist SCA.
Keywords:authentication protocol  cellular authentication and voice encryption (CAVE)  code-division multiple access (CDMA)  secure hash algorithm 1 (SHA-1)  side-channel analysis  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学技术学报》浏览原始摘要信息
点击此处可从《计算机科学技术学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号