SIST EN 300 175-7 V1.5.1:2005
(Main)Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features
Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features
Maintenance update.
Digitalne izboljšane brezvrvične telekomunikacije (DECT) - Skupni vmesnik (CI) - 7. del: Varnostne lastnosti
General Information
Standards Content (Sample)
SLOVENSKI STANDARD
SIST EN 300 175-7 V1.5.1:2005
01-julij-2005
'LJLWDOQHL]EROMãDQHEUH]YUYLþQHWHOHNRPXQLNDFLMH'(&76NXSQLYPHVQLN&,
GHO9DUQRVWQHODVWQRVWL
Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7:
Security features
Ta slovenski standard je istoveten z: EN 300 175-7 Version 1.5.1
ICS:
33.070.30 'LJLWDOQHL]EROMãDQH Digital Enhanced Cordless
EUH]YUYLþQHWHOHNRPXQLNDFLMH Telecommunications (DECT)
'(&7
SIST EN 300 175-7 V1.5.1:2005 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
---------------------- Page: 1 ----------------------
SIST EN 300 175-7 V1.5.1:2005
---------------------- Page: 2 ----------------------
SIST EN 300 175-7 V1.5.1:2005
ETSI EN 300 175-7 V1.5.1 (2001-02)
European Standard (Telecommunications series)
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 7: Security features
---------------------- Page: 3 ----------------------
SIST EN 300 175-7 V1.5.1:2005
2 ETSI EN 300 175-7 V1.5.1 (2001-02)
Reference
REN/DECT-000157-7
Keywords
DECT, radio, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33492 94 4200 Fax: +33493 65 4716
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/
If you find errors in the present document, send your comment to:
editor@etsi.fr
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2001.
All rights reserved.
ETSI
---------------------- Page: 4 ----------------------
SIST EN 300 175-7 V1.5.1:2005
3 ETSI EN 300 175-7 V1.5.1 (2001-02)
Contents
Intellectual Property Rights .7
Foreword.7
Introduction.8
1 Scope.11
2 References.11
3 Definitions and abbreviations.12
3.1 Definitions . 12
3.2 Abbreviations. 13
4 Security architecture .14
4.1 Background. 14
4.2 Security services. 14
4.2.1 Authentication of a PT . 14
4.2.2 Authentication of an FT . 15
4.2.3 Mutual authentication. 15
4.2.4 Data confidentiality. 15
4.2.5 User authentication . 15
4.3 Security mechanisms. 15
4.3.1 Authentication of a PT . 15
4.3.2 Authentication of an FT . 16
4.3.3 Mutual authentication. 17
4.3.4 Data confidentiality. 18
4.3.4.1 Derived Cipher Key (DCK) . 18
4.3.4.2 Static Cipher Key (SCK). 18
4.3.5 User authentication . 18
4.4 Cryptographic parameters and keys. 19
4.4.1 Overview. 19
4.4.2 Cryptographic parameters . 19
4.4.3 Cryptographic keys . 20
4.4.3.1 Authentication key K. 20
4.4.3.2 Authentication session keys KS and KS'. 21
4.4.3.3 Cipher key CK. 22
4.5 Security processes . 22
4.5.1 Overview. 22
4.5.2 Derivation of authentication key, K . 22
4.5.2.1 K is derived from UAK. 23
4.5.2.2 K is derived from AC. 23
4.5.2.3 K is derived from UAK and UPI . 23
4.5.3 Authentication processes. 23
4.5.3.1 Processes for the derivation of KS and KS'.24
4.5.3.2 Processes for the derivation of DCK, RES1 and RES2. 24
4.5.4 Key stream generation. 25
4.6 Combinations of security services. 25
5 Algorithms for security processes .26
5.1 Background. 26
5.1.1 A algorithm. 26
5.2 Derivation of session authentication key(s) . 26
5.2.1 A11 process . 26
5.2.2 A21 process . 27
5.3 Authentication and cipher key generation processes . 27
5.3.1 A12 process . 27
5.3.2 A22 process . 27
ETSI
---------------------- Page: 5 ----------------------
SIST EN 300 175-7 V1.5.1:2005
4 ETSI EN 300 175-7 V1.5.1 (2001-02)
6 Integration of security.28
6.1 Background. 28
6.2 Association of keys and identities . 28
6.2.1 Authentication key. 28
6.2.1.1 K is derived from UAK. 28
6.2.1.2 K derived from AC. 29
6.2.1.3 K derived from UAK and UPI. 29
6.2.2 Cipher keys. 29
6.3 NWK layer procedures . 29
6.3.1 Background . 29
6.3.2 Authentication exchanges. 30
6.3.3 Authentication procedures. 31
6.3.3.1 Authentication of a PT. 31
6.3.3.2 Authentication of an FT. 31
6.3.4 Transfer of Cipher Key, CK . 31
6.4 MAC layer procedures. 32
6.4.1 Background . 32
6.4.2 MAC layer field structure. 32
6.4.3 Data to be encrypted . 33
6.4.4 Encryption process. 33
6.4.5 Initialization and synchronization of the encryption process. 35
6.4.6 Encryption mode control. 36
6.4.6.1 Background. 36
6.4.6.2 MAC layer messages . 37
6.4.6.3 Procedures for switching to encrypt mode . 37
6.4.6.4 Procedures for switching to clear mode . 40
6.4.7 Handover of the encryption process. 41
6.4.7.1 Bearer handover, uninterrupted ciphering. 41
6.4.7.2 Connection handover, uninterrupted ciphering. 42
6.4.7.3 External handover - handover with ciphering.42
6.4.8 Modifications for half slot specifications . 42
6.4.8.1 Background. 42
6.4.8.2 MAC layer field structure . 43
6.4.8.3 Data to be encrypted . 43
6.4.8.4 Encryption process . 43
6.4.8.5 Initialization and synchronization of the encryption process. 43
6.4.8.6 Encryption mode control. 43
6.4.8.7 Handover of the encryption process . 44
6.4.9 Modifications for double slot specifications. 44
6.4.9.1 Background. 44
6.4.9.2 MAC layer field structure . 44
6.4.9.3 Data to be encrypted . 44
6.4.9.4 Encryption process . 45
6.4.9.5 Initialization and synchronization of the encryption process. 45
6.4.9.6 Encryption mode control. 45
6.4.9.7 Handover of the encryption process . 46
6.4.10 Modifications for multi-bearer specifications. 46
6.4.11 Modifications for 4- and 8- level modulation formats. 46
6.4.11.1 Background. 46
6.4.11.2 MAC layer field structure . 47
6.4.11.3 Data to be encrypted . 50
6.4.11.4 Encryption process . 50
6.4.11.5 Initialization and synchronization of the encryption process. 53
6.4.11.6 Encryption mode control. 53
6.4.11.7 Handover of the encryption process . 53
6.5 Security attributes. 53
6.5.1 Background . 53
6.5.2 Authentication protocols . 54
6.5.2.1 Authentication of a PT. 54
6.5.2.2 Authentication of an FT. 55
6.5.3 Confidentiality protocols. 56
6.5.4 Access-rights protocols . 58
ETSI
---------------------- Page: 6 ----------------------
SIST EN 300 175-7 V1.5.1:2005
5 ETSI EN 300 175-7 V1.5.1 (2001-02)
6.5.5 Key numbering and storage. 59
6.5.5.1 Authentication keys . 59
6.5.5.2 Cipher keys . 59
6.5.6 Key allocation. 60
6.5.6.1 Introduction. 60
6.5.6.2 UAK allocation . 60
7 Use of security features.61
7.1 Background. 61
7.2 Key management options. 62
7.2.1 Overview of security parameters relevant for key management . 62
7.2.2 Generation of authentication keys. 63
7.2.3 Initial distribution and installation of keys . 63
7.2.4 Use of keys within the fixed network. 64
7.3 Confidentiality service with a Cordless Radio Fixed Part (CRFP). 68
7.3.1 General. 68
7.3.2 CRFP initialization of PT cipher key . 68
Annex A (informative): Security threats analysis .69
A.1 Introduction.69
A.2 Threat A - Impersonating a subscriber identity.70
A.3 Threat B - Illegal use of a handset (PP) .70
A.4 Threat C - Illegal use of a base station (FP).70
A.5 Threat D - Impersonation of a base station (FP).71
A.6 Threat E - Illegally obtaining user data and user related signalling information.71
A.7 Conclusions and comments.72
Annex B (informative): Security features and operating environments .74
B.1 Introduction.74
B.2 Definitions.74
B.3 Enrolment options.75
Annex C (informative): Reasons for not adopting public key techniques .76
Annex D (informative): Overview of security features .77
D.1 Introduction.77
D.2 Authentication of a PT.77
D.3 Authentication of an FT.78
D.4 Mutual authentication of a PT and an FT.78
D.4.1 Direct method. 78
D.4.2 Indirect method 1 . 78
D.4.3 Indirect method 2 . 78
D.5 Data confidentiality .78
D.5.1 Cipher key derivation as part of authentication. 79
D.5.2 Static cipher key. 79
D.6 User authentication.79
D.7 Key management in case of roaming.79
D.7.1 Introduction. 79
D.7.2 Use of actual authentication key K. 80
D.7.3 Use of session keys. 81
D.7.4 Use of precalculated sets. 82
ETSI
---------------------- Page: 7 ----------------------
SIST EN 300 175-7 V1.5.1:2005
6 ETSI EN 300 175-7 V1.5.1 (2001-02)
Annex E (informative): Limitations of DECT security .83
E.1 Introduction.83
E.2 Protocol reflection attacks.83
E.3 Static cipher key and short Initial Vector (IV) .83
E.4 General considerations regarding key management .84
E.5 Use of a predictable challenge in FT authentication.84
Annex F (informative): Security features related to target networks .85
F.1 Introduction.85
F.1.1 Notation and DECT reference model . 85
F.1.2 Significance of security features and intended usage within DECT. 85
F.1.3 Mechanism/algorithm and process requirements . 86
F.2 PSTN reference configurations .87
F.2.1 Domestic telephone. 87
F.2.2 PBX. 88
F.2.3 Local loop. 90
F.3 ISDN reference configurations.91
F.3.1 Terminal equipment . 91
F.3.2 Network termination 2. 92
F.3.3 Local loop. 92
F.4 X.25 reference configuration.92
F.4.1 Data Terminal Equipment (DTE). 92
F.4.2 PAD equipment. 93
F.5 GSM refere
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.