Top   in Index   Prev   Next

TS 33.120
Security Objectives and Principles

Use "3GPP‑Page" to get the Word version, and "ETSI‑search" to get the PDF version
V4.0.0 (PDF)  2001/04  11 p.
V3.0.0  1999/04  11 p.
Mr. Sahlin, Bengt

Content for  TS 33.120  Word version:   4.0.0

Here   Top

1  ScopeWord‑p. 5
The present document gives the objectives and principles of 3GPP security.
The principles state what is to be provided by 3G security as compared to the security of second generation systems. The principles will also ensure that 3G security can secure the new services and new service environments offered by 3G systems.
The objectives give general, high level requirements for 3GPP security which will be expanded upon in 3G TS 21.133.
The priorities for the implementation of 3GPP security are also given.

2  References

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]  3G TS 21.133: "3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Threats and Requirements".
[2]  UMTS 33.21, V3.0.0: "Universal Mobile Telecommunications System (UMTS); Security Requirements".
[3]  ARIB, Volume 1: "Requirements and Objectives for 3G Mobile Services and System (Ver.0.8)", Annex 8.
[4]  Tdoc S3-99014, 3GPP TSG SA, WG3 (Security), London, 2-4 February, 1999.

3  Abbreviations

For the purposes of the present document, the following abbreviations apply:
Home Environment
International Mobile Equipment Identifier
Lawful Interception
Mobile Execution Environment
SIM Application Toolkit
Serving Network
Subscriber Identity Module

4  3G Security PrinciplesWord‑p. 6
There are three key principles behind 3G security:
  1. 3G security will build on the security of second generation systems. Security elements within GSM and other second generation systems that have proved to be needed and robust shall be adopted for 3G security. These elements are listed in subclause 4.1.
  2. 3G security will improve on the security of second generation systems - 3G security will address and correct real and perceived weaknesses in second generation systems. The most important of these are given in subclause 4.2.
  3. 3G security will offer new security features and will secure new services offered by 3G.

4.1  Second Generation Security Elements to be retained

3G security shall retain (and in some cases develop) the following security elements of second generation systems:
  1. authentication of subscribers for service access.
    Problems with inadequate algorithms will be addressed. Conditions regarding the optionality of authentication and its relationship to encryption shall be clarified and tightened;
  2. radio interface encryption.
    The strength of the encryption will be greater than that used in second generation systems (the strength is a combination of key length and algorithm design). This is to meet the threat posed by the increased computing power available to those attempting cryptanalysis of the radio interface encryption. Problems caused by multiple algorithms will be dealt with (note);
  3. subscriber identity confidentiality on the radio interface.
    However, a more secure mechanism will be provided;
  4. the SIM as:
    a removable, hardware security module that is:
    • manageable by network operators;
    • independent of the terminal as regards its security functionality.
  5. SIM application toolkit security features providing a secure application layer channel between the SIM and a home network server.
    Other application layer channels may also be provided;
  6. the operation of security features is independent of the user, i.e. the user does not have to do anything for the security features to be in operation.
    However, greater user visibility of the operation of security features will be provided to the user;
  7. HE trust in the SN for security functionality is minimised.

4.2  Weaknesses in Second Generation security

The following weaknesses in the security of GSM (and other second generation systems) will be corrected in 3G security:
  1. active attacks using a "false BTS" are possible;
  2. cipher keys and authentication data are transmitted in clear between and within networks;
  3. encryption does not extend far enough towards the core network resulting in the cleartext transmission of user and signalling data across microwave links (in GSM, from the BTS to the BSC);
  4. user authentication using a previously generated cipher key (where user authentication using RAND, SRES and A3/8 is not provided) and the provision of protection against channel hijack rely on the use of encryption, which provides implicit user authentication. However, encryption is not used in some networks, leaving opportunities for fraud;
  5. data integrity is not provided. Data integrity defeats certain false BTS attacks and, in the absence of encryption, provides protection against channel hijack;
  6. the IMEI is an unsecured identity and should be treated as such;
  7. fraud and LI were not considered in the design phase of second generation systems but as afterthoughts to the main design work;
  8. there is no HE knowledge or control of how an SN uses authentication parameters for HE subscribers roaming in that SN;
  9. second generation systems do not have the flexibility to upgrade and improve security functionality over time.

4.3  New Security Features and the Security of New Service FeaturesWord‑p. 7
The new service features that will be secured cannot be listed at the time of writing. However, the environment in which these features are likely to be developed can be described. 3G security will secure this environment.
The environment in which new services will be developed can be characterised by (but is not limited to) the following aspects:
  • there will be new and different providers of services. For example: content providers, data service providers, HLR only service providers;
  • 3G mobile systems will be positioned as the preferred means of communications for users. They will be preferable to fixed line systems;
  • there will be a variety of prepaid and pay-as-you-go services which may be the rule rather than the exception. A long-term subscription between the user and a network operator may not be the paradigm. (3G security will provide satisfactory security for such systems and will not be content with insecure systems such as GSM Advice of Charge);
  • there will be increased control for the user over their service profile (which they might manage over the Internet) and over the capabilities of their terminal (it will be possible to download new services and functions using systems such as MExE and SAT);
  • there will be active attacks on users. (In active attacks, equipment is used to impersonate parts of the network to actively cause lapses in security. In passive attacks, the attacker is outside the system and listens in, hoping security lapses will occur);
  • non-voice services will be as important as, or more important than, voice services;
  • the terminal will be used as a platform for e-commerce and other applications. Multi-application smartcards where the USIM is one application among many can be used with the terminal. The smartcard and terminal will support environments such as Java to allow this. The terminal may support personal authentication of the user using biometric methods.

5  3G Security ObjectivesWord‑p. 8
In addition to the above principles for 3G security, there are the high level objectives given below. These will be expanded upon in 3G TS 21.133:
  1. to ensure that information generated by or relating to a user is adequately protected against misuse or misappropriation;
  2. to ensure that the resources and services provided by serving networks and home environments are adequately protected against misuse or misappropriation;
  3. to ensure that the security features standardised are compatible with world-wide availability. (There shall be at least one ciphering algorithm that can be exported on a world-wide basis (in accordance with the Wassenaar agreement));
  4. to ensure that the security features are adequately standardised to ensure world-wide interoperability and roaming between different serving networks;
  5. to ensure that the level of protection afforded to users and providers of services is better than that provided in contemporary fixed and mobile networks (including GSM);
  6. to ensure that the implementation of 3GPP security features and mechanisms can be extended and enhanced as required by new threats and services.

6  Priorities

As a priority, 3G security will provide the proven second generation security features described in subclause 4.1 and correct the weaknesses in second generation systems described in subclause 4.2.
Security for new services and service environments will then be developed as required.

A  Change historyWord‑p. 9

Up   Top