Beruflich Dokumente
Kultur Dokumente
General Details
Before going into the technical details of a Authentication procedure here is
brief idea what actually happens.During Authentication Procedure some messages
have been exchanged between User Entity and Authentication Entity via
controlling entity. During this message exchange some algorithms are applied on
User Entity and Authentication Entity; as a result of these algorithms one or
two secret information (KEYs) have been generated; these generated information
(KEYS) are sent by User Entity to controlling entity and Authentication entity
to controlling entity. After receiving information from both entities
controlling entities compares them if they are identical then authentication
is successful otherwise not a valid subscriber.
Following Image gives the idea how it works with MSC (Controlling Entity)
Following Image gives the idea how it works with SGSN (Controlling Entity)
SIM - Subscriber Identity Module contains following data for Authentication for
each subscriber
1) IMSI:- International Mobile Subscriber Identity
2) Secret Key (K 128 Bits):- This key some times known as shared
key as well because this is present in both SIM and HSS.
3)Algorithm A3:- Authentication algorithm
4)Algorithm A8:- Ciphering key generator.
5)Algorithm A5:- Ciphering/deciphering algorithm (Used after
authentication to hide data with CK Ciphering key )
Following table contains the attribute used in KEY generation, Table gives
the usage of each attribute,size and place where they are used/stored.
Step -1 User sends a attach request toward SGSN, and SGSN send authentication
request toward HSS/HLR.
b) Now randomly pick any sequence number out of 32. At very first all sequence
number is set to zero and shall be increase by one as a considered sequence
number is used. Sequence Number is of following format.Give a minute to
following image which is self-explanatory (8-Motions)
c) Say sequence number with index IND 3 (three) is picked then value of SEQ
shall be incremented by one and updated information is stored in HSS. if suppose
once again sequence number with IND 3 (three) is selected then again one is
incremented as shown below.
d) Now generate XRES, ATUN, CK , IK. Give few seconds to following image it has
9 motions.
Step -8 UE shall generate XMAC, RES, CK, IK. in following way. Give a minute to
following IMAGE which is self-explanatory, it contains 5 motions.
Authentication Vector Processing at UE
4G Authentication Procedure
KASME = HMAC-SHA-256(Key,S)
where,
S = FC||P0||L0||P1||L1||P2||L2||P3||L3||... ||Pn||Ln