A Formal Analysis of 5G Authentication

被引:255
作者
Basin, David [1 ]
Dreier, Jannik [2 ]
Hirschi, Lucca [3 ]
Radomirovic, Sasa [4 ]
Sasse, Ralf [1 ]
Stettler, Vincent [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[2] Univ Lorraine, CNRS, INRIA, LORIA, Nancy, France
[3] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[4] Univ Dundee, Sch Sci & Engn, Dundee, Scotland
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
基金
欧盟地平线“2020”;
关键词
5G standard; authentication protocols; AKA protocol; symbolic verification; formal analysis;
D O I
10.1145/3243734.3243846
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose. We provide the first comprehensive formal model of a protocol from the AKA family: 5G AKA. We also extract precise requirements from the 3GPP standards defining 5G and we identify missing security goals. Using the security protocol verification tool Tamarin, we conduct a full, systematic, security evaluation of the model with respect to the 5G security goals. Our automated analysis identifies the minimal security assumptions required for each security goal and we find that some critical security goals are not met, except under additional assumptions missing from the standard. Finally, we make explicit recommendations with provably secure fixes for the attacks and weaknesses we found.
引用
收藏
页码:1383 / 1396
页数:14
相关论文
共 36 条
[1]  
[Anonymous], 2018, THE TAMARIN MANUAL
[2]  
[Anonymous], 33902 3GPP TS
[3]  
[Anonymous], 2018, TAMARIN PROVER
[4]  
[Anonymous], ARXIV180610360
[5]  
[Anonymous], 2022, Technical specification. BC556a
[6]  
Arapinis M., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, DOI 10.1145/2382196.2382221
[7]   Improving the Security of Cryptographic Protocol Standards [J].
Basin, David ;
Cremers, Cas ;
Miyazaki, Kunihiko ;
Radomirovic, Sasa ;
Watanabe, Dai .
IEEE SECURITY & PRIVACY, 2015, 13 (03) :24-31
[8]   Provably repairing the ISO/IEC 9798 standard for entity authentication [J].
Basin, David ;
Cremers, Cas ;
Meier, Simon .
JOURNAL OF COMPUTER SECURITY, 2013, 21 (06) :817-846
[9]  
Basin David, 2015, P 22 ACM SIGSAC C CO
[10]  
Basin David, 2018, TAMARIN MODELS PROOF