首页 > 其他分享 >WIFI中EAP-SIM认证分析

WIFI中EAP-SIM认证分析

时间:2024-09-10 13:52:58浏览次数:3  
标签:RAND Algorithm bits WIFI A3 authentication EAP GSM SIM

WIFI中EAP-SIM认证分析

一  关键术语

AAA protocol

    Authentication, Authorization, and Accounting protocol

AuC

    Authentication Centre. The GSM network element that provides the authentication triplets for authenticating the subscriber.

Authentication vector

    GSM triplets can be alternatively called authentication  vectors.

Fast re-authentication

    An EAP-SIM authentication exchange that is based on keys derived upon a preceding full authentication exchange. The GSM authentication and key exchange algorithms are not used in the fast re-authentication procedure.

Fast Re-authentication Identity

   A fast re-authentication identity of the peer, including an NAI realm portion in environments where a realm is used.  Used on fast re-authentication only.

Fast Re-authentication Username

   The username portion of fast re-authentication identity, i.e., not including any realm portions.

Full authentication

   An EAP-SIM authentication exchange based on the GSM authentication and key agreement algorithms.

GSM

   Global System for Mobile communications.

GSM Triplet

   The tuple formed by the three GSM authentication values RAND, Kc, and SRES.

IMSI

   International Mobile Subscriber Identifier, used in GSM to identify subscribers.

MAC

   Message Authentication Code

NAI

   Network Access Identifier

Nonce

A value that is used at most once or that is never repeated within the same cryptographic context.  In general, a nonce can be predictable (e.g., a counter) or unpredictable (e.g., a random value). Since some cryptographic properties may depend on the randomness of the nonce, attention should be paid to         whether a nonce is required to be random or not. In this document, the term nonce is only used to denote random nonces, and it is not used to denote counters.

Permanent Identity

    The permanent identity of the peer, including an NAI realm portion in environments where a realm is used. The permanent identity is usually based on the IMSI. Used on full authentication only.

Permanent Username

   The username portion of permanent identity, i.e., not including any realm portions.

Pseudonym Identity

  A pseudonym identity of the peer, including an NAI realm portion in environments where a realm is used. Used on full authentication only.

Pseudonym Username

   The username portion of pseudonym identity, i.e., not including any realm portions.

SIM

   Subscriber Identity Module.  The SIM is traditionally a smart card distributed by a GSM operator.

二 包格式

EAP-SIM 的Type 为18

三 关键字段

3.1 AT_IDENTITY

3.2 AT_RAND

3.3 AT_MAC

3.4 AT_IV, AT_ENCR_DATA, and AT_PADDING

四 关键字段在消息中的分布

五 EAP-SIM消息交互流程

六 Algorithm A3

从Ki和RAND计算出SRES

Algorithm A3 is considered as a matter for GSM PLMN operators. Therefore, only external specifications are given. However a proposal for a possible Algorithm A3 is managed by GSM/MoU and available upon appropriate request.

6.1 Purpose

As defined in GSM 03.20, the purpose of Algorithm A3 is to allow authentication of a mobile subscriber's identity.

To this end, Algorithm A3 must compute an expected response SRES from a random challenge RAND sent by the network. For this computation, Algorithm A3 makes use of the secret authentication key Ki.

6.2 Implementation and operational requirements

On the MS side, Algorithm A3 is contained in a Subscriber Identity Module, as specified in GSM 02.17.

On the network side, it is implemented in the HLR or the AuC. The two input parameters (RAND and Ki) and the output parameter (SRES) of Algorithm A3 shall use the following formats:

-     length of Ki:            128 bits;

-     length of RAND:    128 bits;

-     length of SRES:       32 bits.

The run-time of Algorithm A3 shall be less than 500 ms.

七 Algorithm A8

从Ki和RAND计算出Kc

Algorithm A8 is considered as a matter for GSM PLMN operators as is Algorithm A3.

A proposal for a possible Algorithm A8 is managed by GSM/MoU and available upon appropriate request.

7.1 Purpose

As defined in GSM 03.20, Algorithm A8 must compute the ciphering key Kc from the random challenge RAND sent during the authentication procedure, using the authentication key Ki.

7.2 Implementation and operational requirements

On the MS side, Algorithm A8 is contained in the SIM, as specified in GSM 02.17.

On the network side, Algorithm A8 is co-located with Algorithm A3.

The two input parameters (RAND and Ki) and the output parameter (Kc) of Algorithm A8 shall follow the following formats:

-     length of Ki:  128 bits;

-     length of RAND:    128 bits;

-     length of Kc:   64 bits.

Since the maximum length of the actual ciphering key is fixed by GSM/MoU, Algorithm A8 shall produce this actual ciphering key and extend it (if necessary) into a 64 bit word where the non-significant bits are forced to zero. It is assumed that any non-significant bits are the least significant bits and that, the actual ciphering key is contained in the most significant bits. For signalling and testing purposes the ciphering key Kc has to considered to be 64 unstructured bits.

八 TCPDUMP包

具体TCPDUMP包见https://download.csdn.net/download/bobhu4201/89730088

标签:RAND,Algorithm,bits,WIFI,A3,authentication,EAP,GSM,SIM
From: https://blog.csdn.net/bobhu4201/article/details/142062064

相关文章

  • 实例讲解Simulink CAN通讯丢失故障判定模型搭建及仿真测试验证方法
    在电动汽车VCU软件开发中,要开发故障诊断模块,故障诊断类型中CAN报文通讯丢失的判定是非常重要的一个,当检测到某个控制器CAN报文通讯丢失,即接收不到该控制器的有效CAN信号,需要根据通讯丢失的判断作出相应的故障处理,以保证整车行车安全。本文通过ABS通讯丢失Simulink模块的搭建,介......
  • WiFi基础(三):802.11ac/ax/be 与 WiFi4、WiFi5、WiFi6、WiFi7
    liwen012024.09.08前言经过二十多年的发展,WiFi在硬件能力、软件和算法、频谱资源、市场需求、电源与能效方面都有了很大的提升。所以我们能看到从最开始只有几M速率的802.11b,发展到现在几十G速率的WiFi6,WiFi7。前面我们介绍了802.11b/g/n的一些核心技术和基础概念,本......
  • Multisim 14.3新功能及安装教程和下载
    Multisim14.3是NI(NationalInstruments)开发的一款强大的电路仿真和设计软件,它主要用于模拟和分析电路原理图。以下是Multisim14.3的一些新功能和改进:增强的元件库:Multisim14.3扩展了元件库,增加了更多的实际器件和仿真模型,使用户能够更精确地设计和验证电路。改进......
  • Java反序列化漏洞-TemplatesImpl利用链分析
    目录一、前言二、正文1.寻找利用链2.构造POC2.1生成字节码2.2加载字节码1)getTransletInstance2)defineTransletClasses2.3创建实例3.完整POC三、参考文章一、前言java.lang.ClassLoader#defineClassdefineClass可以加载字节码,但由于defineClass的作用域是protected,所以攻......
  • Matlab/Simulink和AMEsim联合仿真(以PSO-PID算法为例)
    目录安装软件和配置环境变量Matlab/Simulink和AMEsim联合仿真详细流程非常重要的一点Simulink模型和AMEsim模型用S-Function建立连接从AMEsim软件打开MatlabMatlab里的设置Matlab的.m文件修改(对于PSO-PID算法)运行程序我印象中好像做过Matlab/Simulink和AMEsim联合仿......
  • rk3566 android11 识别WiFi/蓝牙芯片模块有误,导致WiFi、蓝牙打不开的情况
    现象:WiFi、蓝牙驱动已安装,设备树等配置都已完成,但是WiFi/蓝牙还是打不开,要排除是否是开发板识别蓝牙WiFi芯片有误的情况。目录一、WIFI芯片识别流程二、WiFi芯片识别有误1、adb命令查看加载的WIFI芯片2、WIFI芯片对应的pidvid3、查看WiFi芯片设备和ID号4、修改默认加......
  • 基于PSO优化的MPPT最大功率跟踪光伏发电系统simulink仿真
    1.课题概述在simulink中建立基于PSO优化的MPPT最大功率跟踪光伏发电系统,整个系统包括光伏发电模块,MPPT模块,PSO优化模块,电路模块等,其中PSO优化模块采用内嵌matlab编程,分装为模块在simulink中被调用。2.系统仿真结果3.核心程序与模型版本:MATLAB2022a4.系统原理简介光伏发电系......
  • 基于PSO优化的MPPT最大功率跟踪光伏发电系统simulink仿真
    1.课题概述       在simulink中建立基于PSO优化的MPPT最大功率跟踪光伏发电系统,整个系统包括光伏发电模块,MPPT模块,PSO优化模块,电路模块等,其中PSO优化模块采用内嵌matlab编程,分装为模块在simulink中被调用。 2.系统仿真结果   3.核心程序与模型版本:MATLAB2022......
  • 基于WiFi的智能照明控制系统的设计与实现(论文+源码)
    1系统方案设计本设计智能照明控制系统,结合STM32F103单片机、光照检测模块、显示模块、按键模块、太阳能板、LED灯模块、WIFI模块等器件构成整个系统,在功能上可以实现光照强度检测,并且在自动模式下可以自动调节照明亮度,在手动模式下,用户可以手动调节亮度,并且借助ESP8266WiFi他......
  • 【2024高教社杯全国大学生数学建模竞赛】E题:交通流量管控 最详细的问题分析及VISSIM软
    【2024高教社杯全国大学生数学建模竞赛】E题:交通流量管控最详细的问题分析及VISSIM软件仿真1题目随着城市化进程的加快、机动车的快速普及,以及人们活动范围的不断扩大,城市道路交通拥堵问题日渐严重,即使在一些非中心城市,道路交通拥堵问题也成为影响地方经济发展和百姓......