Ijcse10 02 02 23 PDF
Ijcse10 02 02 23 PDF
inputs used, the CAVE algorithm enables calculation of 1) False base station attacks: Authentication
SSD and authentication signature during mechanism by CAVE algorithm provides only one way
challenge/response procedure. authentication, i.e. only a base station authenticates a
subscriber and subscriber cannot authenticate the base
1) Authentication key: The Authentication Key (A- station. This leads to base station impersonation or false
key) also known as master key, is the cornerstone of base station attacks [3]. False base station attacks leads
CAVE-based authentication. The A-key is provisioned to eavesdropping of private identity information of the
in the home Authentication Center and the mobile subscriber.
station (MS).The purpose of the A-key in authentication
is to generate Shared Secret Data. 2) Cryptographic attacks: A hash function must be
able to withstand all known types of cryptographic
2) Shared secret data: Shared Secret Data is a 128- attacks. As a minimum, it must have the following
bit value that is calculated using the CAVE algorithm. properties:
The SSD has two parts: SSD_A (64 bit) and SSD_B a) Pre-image resistance: Given a hash h, it
(64 bit) [2]. The mobile uses the SSD_A and the should be difficult to find any message m such that h =
broadcast RAND as inputs to the CAVE algorithm to hash(m). Functions which dont satisfy this property are
generate an 18-bit authentication signature and sends it vulnerable to pre-image attacks.
to the base station. Figure 1 illustrates the generation of
b) Second pre-image resistance: Given an input
shared secret data in existing CDMA 2000 networks.
message m1, it should be hard to find another input
This signature is then used by the base station to check message m2 (not equal to m1) such that hash(m1) =
that the subscriber is legitimate. hash(m2). Functions which dont satisfy this property
are vulnerable to second pre-image attacks.
The mobile uses the SSD_B and the CAVE algorithm
to generate a Public Long Code Mask (PLCM), a c) Collison resistance: It should be difficult to
Cellular Message Encryption Algorithm (CMEA) key find two different messages m1 and m2, such that
(64 bits), and a data key (32 bits). The PLCM is utilized hash(m1) = hash(m2). Functions which dont satisfy
in both the mobile and the network to change the this property are vulnerable to collision attacks.
characteristics of a Long code. This modified Long d) Reconstruction attack : The reconstruction
code is used for voice encryption. attack on CAVE shows that the security offered by
CAVE- 4 is less than 12 bits as it computes a pre-image
for a given hash value in around 2^11 hashing
operations of the algorithm (around 2^13 for CAVE-8).
This attack clearly reveals that, 4-round CAVE can be
broken in average time equivalent to 1.3*2 ^10 and 8-
round CAVE can be broken in 1.25*2^12 executions of
the algorithm [4, 5]. Increasing number of rounds from
4 to 8 increases only the workload by 8 times. Hence,
increasing the number of rounds of CAVE is not an
effective way to increase security.
e) List attack: The second approach to attack
CAVE is List attack. In this attack, precomputation is
done to establish look-up-tables that define the operation
of a segment in CAVE [4, 5]. These experiments reveal
that the resulting data sets can specify about half of the
Figure 1. Generation of shared secret data
unknown LFSR (Linear Feedback Shift Register) bits.
B. Drawbacks of CAVE Algorithm
III. ENHANCED SUBSCRIBER AUTHENTICATION
The CAVE algorithm is intended to authenticate a ALGORITHM
legitimate subscriber to the wireless network and
protect the network and customers of mobile phones Enhanced Subscriber Authentication refers to the 3rd
from the cloning fraud. The different attacks on CAVE generation authentication, this new form of
algorithm namely false base station attacks and authentication is based on 3GPP Authentication and
cryptographic attacks are described as follows. Key Agreement (AKA). Authentication mechanism by
CAVE algorithm uses a symmetry key cryptosystem
with Challenge-Response protocol between a base 1) Construction of ESA input to produce SSD:
station and a mobile station. This authentication Construction of ESA input to produce SSD involves the
mechanism has several disadvantages. Only one way construction of Input 1 and Input 2. Figure 3 shows the
authentication is provided, that is, only a base station construction of Input 1. 512-bit length Input 1 is
authenticates a subscriber and CAVE algorithm is also comprised of 16 words and size of each word is 32 bits.
prone to cryptographic attacks. But, Authentication First word is the value XORed Index into standard
mechanism using ESA algorithm uses AKA to enhance SHA1 constant value [6]. SHA1 constant value can be
security strength and to provide mutual authentication any value with 32-bit length. Second word is the value
between a base station and a mobile terminal. This XORed ESN into SHA1 constant value. And, third and
section discusses about the implementation of the ESA fourth words are each XORed first and second word of
algorithm to the existing CDMA systems and also the
RANDSSD into SHA1 constant value.
generation of shared secret data, authentication
signature value, voice privacy code and signaling
message encryption key using ESA algorithm.
The generation of authentication signature value E. Advantages of ESA over CAVE Algorithm
Auth_Signature, using ESA algorithm can be discussed
as follows: ESA algorithm overcomes the false base station
1) Construction of ESA input to produce attacks using AKA mechanism. It also overcomes the
auth_signature : cryptographic attacks. Table I shows the comparison of
Construction of ESA input to produce attacks in ESA and CAVE algorithm.
AUTH_SIGNATURE is almost similar to the
construction of Input 1 and Input 2 besides some Table I: Comparison of attacks in ESA and CAVE
parameters are changed as follows. Figure 6 shows the
construction of Input 3. Referring to the construction of Types of attacks CAVE algorithm ESA algorithm
Input 1, first word of Input 3 is filled with SHA1
constant value which is the same value used in Input1. Pre-image attack 2^128 hashing Nil
operations
Second word is the value XORed ESN into SHA1
Second pre-image 2^128 hashing Nil
constant value. The construction of Input 4 is identical attack operations
with the construction of Input 2 besides A_key is Collision attack 2^16 hashing 2^52 hashing
replaced with SSD_A. operations operations
Reconstruction 2^91 hashing Nil
attack operations
List attack 2^72 hashing Nil
operations
V. PERFORMANCE METRICS
A. Speech Signal
leads to bilateral authentication between MS and for generation of short code, the generated short code is
network. in turn used for voice encryption. The performance
C. Descrambling Process
algorithm shows better performance starts at low Authentication algorithm enhances the security of the
power. Consider the BER of 1/10000, the power CDMA systems.
utilized by the proposed algorithm is about 13db, while
VII. SCOPE FOR FUTURE WORK
the power utilized by RAND PLCM is about 15db and
the error rate is also less. This clearly implies that the
performance of ESA algorithm is better than existing Though the proposed method enhances the security
algorithm. of CDMA systems, it can be further enhanced by
employing AES in the scrambling process, instead of
pseudo-random scrambling. It enhances the physical
BER Performance of ESA & RAND PLCM
0
10 layer built-in security of CDMA systems through
ESA PLCM secure scrambling. AES consumes less memory and
RAND PLCM also ease of implementation and flexibility. CDMA
-1
10 systems with secure scrambling improve the system
performance and information privacy.
-2
10
Since, SHA1 algorithm is prone to collision attack, it
can be overcome by using SHA2 algorithm instead of
BER