The 5G-AKA Authentication Protocol Privacy

被引:72
作者
Koutsos, Adrien [1 ]
机构
[1] Univ Paris Saclay, ENS Paris Saclay, CNRS, LSV, Cachan, France
来源
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P) | 2019年
关键词
AKA; Unlinkability; Privacy; Formal Methods;
D O I
10.1109/EuroSP.2019.00041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the 5G-AKA authentication protocol described in the 5G mobile communication standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions through the use of asymmetric randomized encryption. Nonetheless, we show that except for the IMSI-catcher attack, all known attacks against 5G-AKA privacy still apply. Next, we modify the 5G-AKA protocol to prevent these attacks, while satisfying 5G-AKA efficiency constraints as much as possible. We then formally prove that our protocol is sigma-unlinkable. This is a new security notion, which allows for a fine-grained quantification of a protocol privacy. Our security proof is carried out in the Bana-Comon indistinguishability logic. We also prove mutual authentication as a secondary result.
引用
收藏
页码:464 / 479
页数:16
相关论文
共 28 条
[1]  
3GPP, 2018, TS 33.501 Security architecture and procedures for 5G system, v15.34.1
[2]   The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication [J].
Abadi, Martin ;
Blanchet, Bruno ;
Fournet, Cedric .
JOURNAL OF THE ACM, 2018, 65 (01)
[3]  
[Anonymous], 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security
[4]   Analysing Unlinkability and Anonymity Using the Applied Pi Calculus [J].
Arapinis, Myrto ;
Chothia, Tom ;
Ritter, Eike ;
Ryan, Mark .
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, :107-121
[5]   A Computationally Complete Symbolic Attacker for Equivalence Properties [J].
Bana, Gergei ;
Comon-Lundh, Hubert .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :609-620
[6]  
Bana G, 2012, LECT NOTES COMPUT SC, V7215, P189, DOI 10.1007/978-3-642-28641-4_11
[7]  
Basin D., 2018, ACM C COMP COMM SEC
[8]   miTLS: Verifying Protocol Implementations against Real-World Attacks [J].
Bhargavan, Karthikeyan ;
Fournet, Cedric ;
Kohlweiss, Markulf .
IEEE SECURITY & PRIVACY, 2016, 14 (06) :18-25
[9]  
Blanchet B., PROVERIF CRYPTOGRAPH
[10]   A Computationally Sound Mechanized Prover for Security Protocols [J].
Blanchet, Bruno .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) :193-207