cellphone_real_final

cellphone_real_final - Wither Cell Phone Security?...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Wither Cell Phone Security? Security? Marks, Wang, Kaur, Blazado January 21, 2010 Agenda Agenda A Brief Look at Cell Phone Processing Brief Power and Security Power Cell Phone Exploits Cell Phone Security Cell Phone Processors Conclusion Cell Phone Exploits Cell Cell Phone Exploits Cell GSM broken – September 2003 September – Israeli Scientists – Flaw: un-encrypted error correction Flaw: codes codes – Decipher in fraction of a second – Real-time eaves dropping w/ laptop 144MHz Handspring Treo 600 GSM Release Date: September, 2003 OS: PalmSource Palm OS 5.2 (5.2.1H) CPU: 32bit TI OMAP 1510, 144MHz Source: http://news.techworld.com/security/420/gsm-phone-encryption-blown-wide-open/ Cell Phone Exploits Cell GSM A5/1 Stream Cipher GSM broken broken 312MHz – February 2008 – David Hulton, Steve Muller at David Black Hat DC Black – 3 Ghz Xeon Quad Core, Ghz FPGAs, Frequency Scanner FPGAs, – Broken in under ½ an hour RIM BlackBerry Pearl 8110 Release Date: January, 2008 OS: RIM BlackBerry OS 4.2 CPU: 32bit Intel XScale PXA272, 312MHz http://www.networkworld.com/community/node/25389 Cell Phone Exploits Cell GSM “Kasumi” A5/3 GSM encryption encryption – 15 January 2010 – The Israelis (again!) – Plus Adi Shamir – Linux on Dual Core Intel – “Sandwich attack” Sandwich – Derived the complete 128-bit Derived key key 600 Mhz Apple iPhone 3GS Release Date: June, 2009 OS: iPhone OS CPU: Samsung S5PC100 600 Mhz Source: http://news.techworld.com/mobile-wireless/3210282/new-gsm-encryption-cracked/ Cell Phone Exploits Cell "Previously…it would have still taken me a year "Previously…it to find the key. Now it would take less than two hours on a single computer. on We can all agree that's a bit disturbing.“ We – Orr Dunkelman http://news.techworld.com/mobile-wireless/3210282/new-gsm-encryption-cracked/ Cell Phone Security Cell GSM and CDMA Cell phone Technology around the word word Analog AMPS AMPS Digital CDMA, TDMA, NAMPS Europe Digital GSM World Wide Digital CDMA North America North Security in GSM Security Encryption Encryption A5 algorithm – Authentication-The GSM network authenticates the Authentication-The identity of the subscriber through the use of a challenge-response mechanism A3 and A8 algorithm A3 – Signal and Data Confidentiality-The SIM contains the Signal ciphering key generating algorithm (A8) which is used to produce the 64-bit ciphering key to Reference: http://www.scribd.com/doc/22599374/Security-Encryption-in-GSM-GPRS-CDMA Security in CDMA Security Encryption – It use long code 42 bit long pin which makes It eavesdropping very difficult eavesdropping Authentication – CAVE – SSD ( 128 bits) SSD_A which is used during authentication to calculate SSD_A authentication signatures SSD_B which is used in the generation of session keys for encryption and voice privacy – A key( 64 bit key) – ESN( 32 keys) Reference;http://www.scribd.com/doc/22599374/Security-Encryption-in-GSM-GPRS-CDMA Cell Phone Processors Cell Processor Comparison Processor (unknown) Nexus One (N1) Apple iPhone Processor Intel XScale Qualcomm 8250 ARM Cortex A8 Speed 312 – 624 MHz 1GHz 600MHz Capable MIpS ~800 MIpS 2100 MIpS 1200 MIpS *Source: http://www.xbitlabs.com/news/mobile/display/20040412162917.html http://www.engadget.com/2009/12/23/exclusive-nexus-one-full-specs-detailed-invite-only-retail-sal/ http://www.kongtechnology.com/2010/01/11/will-google-nexus-one-replace-apple-iphone-as-the-next-jesus-phone/ Voice Codec (Vocodec) Voice 2G TDMA required 30-50 MIpS 2.5G TDMA requires over 100 MIpS 3G requires over 200 MIpS 2nd Processor handles the interface – Voice Centric handset = 10 MIpS – Data Intensive handset = 40 MIpS *Source: http://focus.ti.com/lit/an/spra650/spra650.pdf (Texas Instruments – 2000) Encryption – 2G Encryption *Source: http://www.cscjournals.org/csc/manuscript/Journals/IJS/Volume1/Issue1/IJS-1.pdf Encryption – 3G Encryption *Source: http://www.cscjournals.org/csc/manuscript/Journals/IJS/Volume1/Issue1/IJS-1.pdf Explanation of Why – 2G vs 3G Explanation *Source: http://www.cscjournals.org/csc/manuscript/Journals/IJS/Volume1/Issue1/IJS-1.pdf Conclusion Conclusion Modern PCs are powerful to pose a threat to Modern Cell Phone security Cell Advances in Cell Phone security continue Cell Phone Processors are able to scale with Cell increased security demands increased – Processors have made strides in speed – Common to have 2 processors in Cell Phones ...
View Full Document

Ask a homework question - tutors are online