A formal analysis of 5G authentication
dc.contributor.author
Basin, David
dc.contributor.author
Dreier, Jannik
dc.contributor.author
Hirschi, Lucca
dc.contributor.author
Radomirović, Saša
dc.contributor.author
Sasse, Ralf
dc.contributor.author
Stettler, Vincent
dc.date.accessioned
2018-10-08T12:48:39Z
dc.date.available
2018-10-08T12:16:16Z
dc.date.available
2018-10-08T12:48:39Z
dc.date.issued
2018-06-27
dc.identifier.uri
http://hdl.handle.net/20.500.11850/293952
dc.description.abstract
Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose.
We provide the first comprehensive formal model of a protocol from the AKA family: 5G AKA. We also extract precise requirements from the 3GPP standards defining 5G and we identify missing security goals. Using the security protocol verification tool Tamarin, we conduct a full, systematic, security evaluation of the model with respect to the 5G security goals. Our automated analysis identifies the minimal security assumptions required for each security goal and we find that some critical security goals are not met, except under additional assumptions missing from the standard. Finally, we make explicit recommendations with provably secure fixes for the attacks and weaknesses we found.
en_US
dc.language.iso
en
en_US
dc.publisher
Cornell University
en_US
dc.subject
5G standard
en_US
dc.subject
Authentication protocols
en_US
dc.subject
AKA protocol
en_US
dc.subject
Symbolic verification
en_US
dc.subject
Formal analysis
en_US
dc.title
A formal analysis of 5G authentication
en_US
dc.type
Working Paper
ethz.journal.title
arXiv
ethz.pages.start
1806.10360
en_US
ethz.size
21 p.
en_US
ethz.identifier.arxiv
1806.10360
ethz.publication.place
Ithaca, NY
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03634 - Basin, David / Basin, David
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03634 - Basin, David / Basin, David
en_US
ethz.relation.isPreviousVersionOf
10.3929/ethz-b-000300545
ethz.date.deposited
2018-10-08T12:16:17Z
ethz.source
FORM
ethz.eth
yes
en_US
ethz.availability
Metadata only
en_US
ethz.rosetta.installDate
2018-10-08T12:48:41Z
ethz.rosetta.lastUpdated
2022-03-28T21:25:32Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=A%20formal%20analysis%20of%205G%20authentication&rft.jtitle=arXiv&rft.date=2018-06-27&rft.spage=1806.10360&rft.au=Basin,%20David&Dreier,%20Jannik&Hirschi,%20Lucca&Radomirovi%C4%87,%20Sa%C5%A1a&Sasse,%20Ralf&rft.genre=preprint&
Files in this item
Files | Size | Format | Open in viewer |
---|---|---|---|
There are no files associated with this item. |
Publication type
-
Working Paper [5713]