ALG_Tetra_Security
ALG_Tetra_Security
ALG_Tetra_Security
In all of these systems security has proved to be an essential aspect. This is exemplified in GSM where
the inclusion of authentication of the mobile terminal by the network stopped the massive fraud that
was occurring in the previous generation of analogue mobile systems. GSM also provided a very
reasonable confidentiality over the radio path using an encryption that even today can not easily be
broken in practice.
The DECT security was based upon the GSM security and added things to this like an enhanced key
management support and also the possibility of the mobile terminal to authenticate the network. In its
turn TETRA has built on the DECT security and added features which are relevant for Professional
Mobile Radio users, such as end-to-end encryption, encryption for closed user groups and secure
enabling and disabling of mobile terminals.
The security of UMTS is now getting its form. It is clear that it builds upon the security of the existing
standards, but that it will also add further security functions.
Though there is a difference in the specific security in all these standards, they have common
properties that make them superior compared to most non-standardised proprietary products. The
security of the standards was specified by an open expert group using an open and structured
approach and basing its work on well-established methods. The security specifications of all the
1
systems, with the exception of the cryptographic algorithms used , are published and thus open to
public scrutiny.
In this paper we will focus on TETRA security and describe in detail the TETRA security functions.
1
A detailed description on standardised Cryptographic algorithms in Telecommunications Systems and issues relating to this can be found
in [8]
page 1 (13)
This paper is largely based on a document [1] that was published before.
When describing the TETRA security functions it is important to make a distinction between the
different categories of functions and their specific application. In TETRA the following categories can
be identified.
- Security mechanisms. These are independent self-contained functions that aim to achieve a
specific security objective such as confidentiality of information or authentication of mobile
terminals. Security mechanisms are the main building blocks for a security system.
- Security management features. These are functions that are used to control, manage and
operate the individual security mechanisms. They form the heart of the security and should
guarantee that the security features are integrated into a consistent security system.
Furthermore they are used to realise interoperability of the security mechanisms over different
networks. Key management is the most essential security management function.
- Standard cryptographic algorithms. These are standardised system specific mathematical
functions that are used, normally in combination with parameters called “cryptographic keys”,
to provide an adequate security level for the security mechanisms and the security
management features. Standardised cryptographic algorithms are offered in TETRA to support
interoperability between different TETRA systems.
- Lawful interception mechanisms. These are functions that are used within communication
systems to provide the lawfully required access to information and communication, with the
aim to fulfil national regulatory requirements. It is essential that such functions do not
undermine the regular security of the system. Therefore these functions should be controlled
through the security management.
Figure 1 depicts the basic relations between the different security functions.
page 2 (13)
Security Management
Lawful Interception Lawful Interception
mechanisms Interface
Security management features
Control, Key
Management
It is very important to be aware of the different roles and objectives of these classes. In certain
proprietary systems especially the first two classes are often confused. This results in a “knot” of
security features, which is difficult to analyse and even harder to correctly implement and control in an
operational environment. But also mechanisms and algorithms get confused. Sometimes one tends to
assess security provided by a certain mechanism only by the strength of the algorithm used, ignoring
the environment in which it is used. (This has occurred for the GSM encryption and the A5/1 encryption
algorithm).
page 3 (13)
In TETRA, as in most other secure systems, the authentication is a firm basis for the overall security. It
can be used for the following purposes.
The mutual authentication security mechanism is available for Voice and Data and Packet Data
4
Optimised mode. In Direct Mode Operation (DMO) an explicit authentication mechanism is not
5
available; in this case the use of Static Cipher Keys (SCK) can however provide implicit mutual
authentication.
The use of several authentication algorithms, both standard and proprietary, is supported (see section
2.3.2).
Mutual authentication is done on the basis of an authentication key K, which is unique for every MS or
SIM if the latter is used. The K is both stored in the MS/SIM and in the network. Normally a specific
network element is used to store the Authentication keys. This is called the Authentication Centre
(AUC).
Mutual authentication using an Authentication Centre is illustrated in the figure below.
Authentication Key K
Authentication Key K
2
The Derived Cipher Key (DCK) is a unique encryption key used to encrypt information which is exchanged on
the link between the network and the MS, see also section 2.2.2.
3
The Subscriber Identity Module (SIM) is a piece of hardware (often a Smart Card) that contains the essential
subscriber information including the authentication key and that can be placed in an MS to “personalise” it.
4
Direct Mode Operation (DMO) is the direct communication between Mobile Stations without the use of a
network
5
The Static Cipher Key (SCK) is a fixed pre-stored encryption key used to encrypt information which is
exchanged on the link between the network and the MS/SIM, see also section 2.2.2.
page 4 (13)
2.1.2 Encryption
As the air interface is very vulnerable to eavesdropping modern mobile and wireless communications
systems all have some form of air interface security. This air interface security is intended to secure
the connection between MS’s and the network. Air interface security is an effective means to provide
security in a mobile network and some essential security functions can only be realised by air interface
security.
In most cases it is sufficient to rely on air interface security and take no further security measures.
However, in TETRA systems needing a very high level of security, additional security may be required
to protect information transmitted from one MS to another not only over the air interface but also within
the network. In this case end-to-end security provides an efficient solution.
The difference between the scope of air interface security and end-to-end security is illustrated in figure
3 below
MS Network MS
page 5 (13)
2.1.2.2 End-to-end encryption
The TETRA end-to-end service can be realised in any number of ways. This means that a user may
easily tailor an end-to-end encryption system to his own requirements. This flexibility is essential for a
standard like TETRA that will be implemented in many forms for different user groups.
Public Safety organisations will have specific (high) national security requirements for their
implementation of end-to-end encryption, which will be different from the requirements of Military user
groups which have even greater security requirements. All such organisations need to be able to
specify an end-to-end encryption system according to their own requirements. It can also be expected
that commercial user groups will have a need for secure end-to-end encryption systems.
The framework has been designed to be adaptable to a range of Security Policies, with the flexibility
being achieved through a number of simple operational choices.
Copies of TETRA MoU SFPG Recommendations may be obtained from the SFPG Secretariat (Mrs.
Marjan Bolle - m.bolle@kpn.com).
2.1.3 Anonymity
Anonymity can be achieved by the SwIM assigning temporary individual or group identities and then
encrypting these identities over the air interface. It is possible to make this encryption dynamic in the
sense that an identity is encrypted in a different way on different occasions. Again, this mechanism is
available for Voice and Data and Direct Mode Operation.
If the TEI is disabled the MS can not be used anymore, even if another ITSI (which can be stored in a
detachable module such as a SIM) is inserted in the MS. If the ITSI is disabled an MS can still be used
in combination with another (enabled) ITSI. The ITSI can not be used in any MS anymore.
In addition the disabling can be either temporary (which leaves the possibility to enable again) or
permanent (which is irreversible). This results in the following nine states:
page 6 (13)
TEI ITSI
Enabled Enabled
Enabled Temp disabled
Enabled Perm disabled
Temp disabled Enabled
Temp disabled Temp disabled
Temp disabled Perm disabled
Perm disabled Enabled
Perm disabled Temp disabled
Perm disabled Perm disabled
The state diagram below, copied from the TETRA security standard [2], describes functions and
states.
7, 8, 9
Enabled
ITSI
and
Eq.
1 9 3 2
4 7, 9 1, 2, 3 8, 9 5
6 1 2
2, 3 1, 3
Temporarily Temporarily Temporarily
disabled Eq. disabled Eq. disabled ITSI
and enabled 8 and ITSI 7 and enabled
4 ITSI Eq.
4
5 5
5 4
6
Permanently
Permanently Permanently Permanently
disabled Eq.
disabled Eq. disabled ITSI disabled ITSI
and temporarily
and enabled and temporarily and enabled
disabled ITSI
ITSI disabled Eq. Eq.
6 6
Permanently
disabled Eq.
and permanently
disabled ITSI
KEY:
page 7 (13)
In systems demanding a high security, disabling and enabling should only take place after mutual
authentication has been performed. If this is not the case the feature (especially the disabling) can
obviously be used to attack the system. The TETRA standard leaves open the possibility to disable and
enable without mutual authentication first taking place, but in practice this will only be done in systems
with a low security level.
This control is one of the tasks of the security management. Another task of the security management
is to guarantee that the security mechanisms are used in the proper way and that the different
mechanisms are integrated in an appropriate way to achieve an overall secure system. The security
management is also responsible for realising the secure interoperability between different (TETRA)
systems.
The form in which the security is condensed is normally that of “keys”. A key is a piece of secret
information that is used, often in combination with cryptographic algorithms, to provide the actual
security to a security mechanism. Often the keys form the interface between the security management
and the security features. The security management is responsible for dealing with the keys in a
secure way. Though the security management is partly an issue for the implementation, in
communication systems like TETRA it is possible to specify certain management features which
support the security management. In addition the TETRA MoU SFPG has produced
Recommendations [6] and [7] to support the security management (especially the key management).
An adequate security management is just as important as the actual security mechanisms.In TETRA
key management, functionality and flexibility are key words. A large number of features have been
integrated to support the key management. A summary of those is provided below.
page 8 (13)
would normally have much less then 128 information bits. Therefore this method for generation of K
should only be used in exceptional cases, e.g. if there is a need for user authentication only or if a key
needs to be generated immediately and there is no possibility to use a User Authentication Key (UAK -
see below).
Method 3 - Generation of K from an Authentication Code (AC) and an User Authentication Key
(UAK)
In this case the K is derived from an AC entered by the user via the keyboard of the handset and a
UAK stored in the handset. The derivation of K from AC and UAK is done via an algorithm. In the
network either only the resulting K is stored, or both the AC and UAK are stored. This method is used if
it is necessary to identify both the user and the handset.
The Derived Cipher Key (DCK) is derived during the authentication procedure. It can be used to
encrypt the link between the network and the MS on an individual basis. Thus it can also provide an
extended implicit authentication during the call, and can e.g. be used for encryption of uplink
communications (i.e. the communication from the MS to the network).
The Common Cipher Key (CCK) is generated by the SwMI and distributed, encrypted with the DCK,
to MS’s. It is efficient to use this key for encryption of messages that are directed to a certain Location
6
Area (LA) . In practice the CCK can be used to set up a group call with all MS’s that at the moment are
in a certain area, independent of the specific closed user groups these MS’s are part of.
When the CCK is distributed to an MS over the air interface using OTAR it is encrypted with the DCK
of this MS.
The Group Cipher Key (GCK) is linked to a specific closed user group. It is generated by the SwMI
and distributed to the MS’s of a group (e.g. similarly to the CCK, on a Smart card, or using OTAR (see
6
A Location Area is a geographical area where a network and a number of MS’s are operational which have
certain logical connections (e.g. Public Safety organisations of a city, a department, etc).
page 9 (13)
below)). Within a Location Area the GCK is always used in a modified form. It is encrypted by the CCK
to obtain the Modified Group Cipher Key (MGCK). If an MS is in this Location Area the MGCK is
used to encrypt the closed user group messages for this MS.
When the GCK is distributed to an MS over the air interface using OTAR it is encrypted with a session
encryption key derived from the Authentication Key for this MS.
The Static Cipher Key (SCK), finally, is a predetermined key which can be used without prior
authentication. It is “static” in the sense that it is a fixed key that is not changed (e.g. by an
authentication exchange) until it is replaced. TETRA supports the use of up to thirty-two (32) SCK’s.
They can be distributed similarly to the GCK’s. Their use is largely implementation dependent but they
can be used for e.g. encryption in Direct Mode Operation (where they may also provide explicit
authentication) and in certain TETRA systems also for encryption for group and individual
communications.
When an SCK is distributed to an MS over the air interface using OTAR it is encrypted with a session
encryption key derived from the Authentication Key for this MS.
2.2.3 OTAR
As indicated above there is a possibility to distribute or update CCK’s, GCK’s and SCK’s using a Over
The Air Re-keying (OTAR) mechanism. This mechanism makes it possible to send in a secure way air
interface encryption keys from the SwMI over the air directly to an MS and can be applied as long as
an authentication key K is available for the MS. The OTAR messages to an MS are encrypted using
session encryption keys that are derived from the authentication key for this MS.
The OTAR mechanism can be used for both an individual MS and for groups of MS’s.
A mechanism similar to OTAR is also available for the management of end-to-end encryption keys.
page 10 (13)
MS network element authentication center (AUC)
page 11 (13)
TEA1 and TEA4: Readily Exportable Algorithms
TEA1 (as the numbering implies) was an early design. TEA4 reflects the more relaxed controls of the
1998 Wassenaar Arrangement.
The standard TETRA Encryption Algorithms are available to TETRA users and manufacturers. They
are distributed by a custodian. In case of the TEA1, TEA3 and TEA4 the custodian is ETSI (see
http://www.etsi.org , section algorithms and codes). The TEA2 is distributed by the Dutch Police IT
organisation.
For those users who are content to follow a public standard, the recommendation includes an appendix
which shows how these cryptographic functions can be realised using the IDEA algorithm. So, the
body of the recommendation together with the appendix forms the complete specification for a
standard TETRA end-to-end encrypted voice service. On this basis the TETRA MoU has established
a licence agreement with ASCOM (the owners of IDEA) covering the use of IDEA in this context.
Details of the licensing agreement and how to make an application are available from the SFPG
secretariat (Mrs. Marjan Bolle - m.bolle@kpn.com).
page 12 (13)
References
[1] G. Roelofsen, TETRA Security – Information Security Technical Report, Vol 5, No.
3 (2000), pp 44-54
[2] ETS 300 392-7, Terrestrial Trunked Radio (TETRA), Voice plus Data (V+D), Part
7: Security Version 2.1.1
[3] ETS 300 396-6, Terrestrial Trunked Radio (TETRA), Direct Mode Operation
(DMO), Part 6: Security (1998)
[4] EN 301 040 , Terrestrial Trunked Radio (TETRA), Security, Lawful Interception
(LI) Interface, V2.0.0 (1998)
page 13 (13)