IIR-tutorial-3
7 pages
English

IIR-tutorial-3

Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres
7 pages
English
Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres

Description

IIR Workshop, London, 9th March, 2000:USECA Demonstrator PresentationIIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation 1USECA DemonstratorDr. Monika HorakGiesecke & Devrient GmbHPrinzregentenstraße 159, D-81607 MünchenMonika.Horak@gdm.deIntroductionAuthentication ProtocolsDemonstrator FeaturesDemonstrator ModulesUSECA USIM3GPP - Demonstrator V1IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation 2USECA USECAIIR Workshop, London, 9th March, 2000:USECA Demonstrator PresentationIntroductionValidate the soundness and feasibility of the resultsof USECADemonstrator USIM Chipcard Terminal PC-SW simulates terminal, network, USIM, intruderAuthentication and key agreement (AKA) 3GPP protocol ASPeCT protocolIIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation 3Protocol PhasesTerminalUSIM NetworkSIM PersonalisationCHV VerificationAKA PreparationAKA Identity / ChallengeAKA AuthenticationRead KeysIIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation 4USECA USECAIIR Workshop, London, 9th March, 2000:USECA Demonstrator PresentationASPeCT ProtocolAdvanced Security for Personal CommunicationsTechnologiesresearch orienteduses public key techniquesallows integration of micropayment system(‘tick payments’)public key protocol implemented on the USECAUSIMIIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation 5ASPeCT ...

Informations

Publié par
Nombre de lectures 21
Langue English

Extrait

IIR Workshop, London, 9th March, 2000: USECA Demonstrator Presentation
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
USECA Demonstrator
Dr. Monika Horak Giesecke & Devrient GmbH Prinzregentenstraße 159, D81607 München Monika.Horak@gdm.de
Introduction Authentication Protocols Demonstrator Features Demonstrator Modules USECA USIM 3GPP  Demonstrator V1
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
1
2
IIR Workshop, London, 9th March, 2000: USECA Demonstrator Presentation
Introduction
Validate the soundness and feasibility of the results of USECA Demonstrator USIM Chipcard Terminal PCSW simulates terminal, network, USIM, intruder Authentication and key agreement (AKA) 3GPP protocol ASPeCT protocol
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
U S IM
Protocol Phases
T e r m i n a l S I MP e r s o n a l i s a t i o n
C H VV e ri f i c a t i o n
A K AP r e p a r a t i o n
A K AI d e n t i t y/ Ch a l l e n g e
A K AA u th e n t i c a t i o n R e a dK e y s
N e tw o rk
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
3
4
IIR Workshop, London, 9th March, 2000: USECA Demonstrator Presentation
ASPeCT Protocol
AdvancedSecurity forPersonalCommunications Technologies research oriented uses public key techniques allows integration of micropayment system (‘tick payments’) public key protocol implemented on the USECA USIM
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
ASPeCT Protocol
U S I MN e t w o r k c o m p u t e c h a l l e n g eP K _ U U s e ra u t h e n t i c a t i o n c h a l l e n g eP K _ U c o m p u t es e s s i o nk e y a n da u t ht o k e n U s e ra u t h e n t ic a t i o n r e q u e s t R N D _ N |A U T H _ N |C E R T N v e r i f yC E R T Na n d A U T H _ N , c o m p u t eA U T H _ U U s e ra u t h e n t i c a t io n r e s p o n s e E n c ( S i g ( A U T H _ U ) )| E n c (C E R T U ) v e r i f yC E R T Ua n d S i g ( A U T H _ U ) C o m p u t eK _ CC o m p u t eK _ Ca n d a n dK _ IK _ I
A u t h e n t i c a t io n a n dk e y e s t a b l i s h m e n t
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
5
6
IIR Workshop, London, 9th March, 2000: USECA Demonstrator Presentation
Demonstrator Features
Visualisation of the UMTS authentication and key establishment protocol protocol flows, protocol messages and state variables of the system the system behaviour in case of failures or fraud attempts Analysing exact tracing of the implemented authentication protocols simulation of fraud attempts user intervention: manipulation of system state variables or protocol messages Evaluation time measure functions log functions
PC
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
Demonstrator Modules
User
Graphical User Interface (GUI)
Demonstrator Engine
USIMTerminal Interface (UTI)
PCCard Reader Interface
Simulated USIM
Card ReaderUSIM
Crypt Library UCL
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
7
8
IIR Workshop, London, 9th March, 2000: USECA Demonstrator Presentation
USECA USIM
Multiapplication smart card: GSM + UMTS Built on G&D SIM card File system and card commands in accordance with 3GPP and ISO/IEC Authentication and key agreement 3GPP protocol ASPeCT protocol Cryptographic functions Functions f1f5, f1*, Symmetric encryption Elliptic curve routines (ASPeCT protocol) IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation9
3GPP  USECA Demonstrator V1
USIM File System file name additional files for analysing and visualisation purposes Commands INTERNAL AUTHENTICATE response: RES or RAND_US || AUTS Management of Sequence Numbers USIM stores SQN_US, RAND_US, SQN
 SQN_USSQN_US+
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation10
IIR Workshop, London, 9th March, 2000: USECA Demonstrator Presentation
Demonstrations
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation11
Screenshot (3GPP Protocol)
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation12
IIR Workshop, London, 9th March, 2000: USECA Demonstrator Presentation
Screenshot (ASPeCT Protocol)
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation13
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents