●Validate the soundness and feasibility of the results of USECA ●Demonstrator USIM Chipcard Terminal PCSW simulates terminal, network, USIM, intruder ●Authentication and key agreement (AKA) 3GPP protocol ASPeCT protocol
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
U S IM
Protocol Phases
T e r m i n a l S I MP e r s o n a l i s a t i o n
C H VV e ri f i c a t i o n
A K AP r e p a r a t i o n
A K AI d e n t i t y/ Ch a l l e n g e
A K AA u th e n t i c a t i o n R e a dK e y s
N e tw o rk
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
●AdvancedSecurity forPersonalCommunications Technologies ●research oriented ●uses public key techniques ●allows integration of micropayment system (‘tick payments’) ●public key protocol implemented on the USECA USIM
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
ASPeCT Protocol
U S I MN e t w o r k c o m p u t e c h a l l e n g eP K _ U U s e ra u t h e n t i c a t i o n c h a l l e n g eP K _ U c o m p u t es e s s i o nk e y a n da u t ht o k e n U s e ra u t h e n t ic a t i o n r e q u e s t R N D _ N |A U T H _ N |C E R T N v e r i f yC E R T Na n d A U T H _ N , c o m p u t eA U T H _ U U s e ra u t h e n t i c a t io n r e s p o n s e E n c ( S i g ( A U T H _ U ) )| E n c (C E R T U ) v e r i f yC E R T Ua n d S i g ( A U T H _ U ) C o m p u t eK _ CC o m p u t eK _ Ca n d a n dK _ IK _ I
A u t h e n t i c a t io n a n dk e y e s t a b l i s h m e n t
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
●Visualisation of the UMTS authentication and key establishment protocol protocol flows, protocol messages and state variables of the system the system behaviour in case of failures or fraud attempts ●Analysing exact tracing of the implemented authentication protocols simulation of fraud attempts user intervention: manipulation of system state variables or protocol messages ●Evaluation time measure functions log functions
PC
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
Demonstrator Modules
User
Graphical User Interface (GUI)
Demonstrator Engine
USIMTerminal Interface (UTI)
PCCard Reader Interface
Simulated USIM
Card ReaderUSIM
Crypt Library UCL
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation
●Multiapplication smart card: GSM + UMTS ●Built on G&D SIM card ●File system and card commands in accordance with 3GPP and ISO/IEC ●Authentication and key agreement 3GPP protocol ASPeCT protocol ●Cryptographic functions Functions f1f5, f1*, Symmetric encryption Elliptic curve routines (ASPeCT protocol) IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation9
3GPP USECA Demonstrator V1
●USIM File System file name additional files for analysing and visualisation purposes ●Commands INTERNAL AUTHENTICATE response: RES or RAND_US || AUTS ●Management of Sequence Numbers USIM stores SQN_US, RAND_US,SQN
SQN_USSQN_US+
IIR Workshop, London, 9th March 2000: USECA Demonstrator Presentation10