edx 4G Network Essentials Week 2: Security Procedures 5 - Key Hierarchy

In the previous video, we saw that we need several
separate keys that must be distributed in various
elements of the LTE network for the ciphering and integrity algorithms.
在之前的视频中,我们看到我们需要几个单独的密钥,这些密钥必须分布在LTE网络的各种元件中,以用于加密和完整性算法。


In this video, we’ll see how
these keys are generated and how they are distributed in the network.
在此视频中,我们将了解如何生成这些密钥以及它们如何在网络中分发。


We should remember that all the security of a 4G network
rests on the principle that there is one
single secret shared between the HSS and the SIM card.
我们应该记住,4G网络的所有安全性都基于HSS和SIM卡之间共享一个秘密的原则。

This secret key must
never leave these two entities.
这个密钥绝不能离开这两个实体。


Yet, we need a first key to ensure
the ciphering of user data between the UE and
the eNodeB, a second key to cipher signaling data
on the same link and a third key to
cipher messages between the UE and the MME.
然而,我们需要第一密钥来确保UE和eNodeB之间的用户数据的加密,第二密钥用于加密同一链路上的信令数据,第三密钥用于加密UE和MME之间的消息。


To ensure the integrity of signaling messages,
we need a key to protect the exchanges between the
UE and the eNodeB and a second key
between the UE and the MME.
为了确保信令消息的完整性,我们需要密钥来保护UE和eNodeB之间的交换以及UE和MME之间的第二密钥。


That’s a lot more than our shared secret K.
这比我们共同的秘密K要多得多。


And, it means it’s necessary to distribute these keys to
several nodes in the network.
并且,这意味着有必要将这些密钥分发到网络中的多个节点。


Thanks to signaling protocols between the SIM, the mobile
terminal, the MME and the HSS, the network
and the terminal will generate all the keys necessary
from the shared secret K, which never leaves the
HSS or the SIM card.
由于SIM,移动终端,MME和HSS之间的信令协议,网络和终端将从共享秘密K生成所需的所有密钥,其从不离开HSS或SIM卡。


Because generating all the requested keys requires the
use of or knowledge of the secret K, we
could think that it would be the HSS which generates
and distributes them itself.
因为生成所有请求的密钥需要使用或知道秘密K,我们可以认为是HSS自己生成和分发它们。


This would pose a scalability problem.
这会造成可扩展性问题。


There are several tens of million UEs.
有数千万UE。


With each change of an eNodeB or of an MME,
the HSS would have to be contacted to generate new keys.
随着eNodeB或MME的每次更改,必须联系HSS以生成新密钥。


To avoid that, the HSS delegates
the generation of keys to the MME that manages the UE.
为了避免这种情况,HSS将密钥的生成委托给管理UE的MME。


If the subscriber is abroad,
that MME is in a different network to the one of the HSS.
如果订户在国外,则该MME与HSS之一处于不同的网络中。


During the first exchanges, the HSS
generates a key called K-ASME where
ASME stands for Access Security Management Entity.
在第一次交换期间,HSS生成一个名为K-ASME的密钥,其中ASME代表访问安全管理实体。


This key is then sent to the
MME, responsible for the mobile terminal.
然后将该密钥发送给负责移动终端的MME。


It’s this key that enables the MME to generate
the rest of the keys necessary.
正是这个密钥使MME能够生成必要的其余密钥。


Nevertheless, the subscriber’s HSS only gives
its trust to the network that just contacted it.
然而,订户的HSS仅向刚接触它的网络提供信任。


We want to avoid a situation where the subscriber can be
transferred to another network without explicit authorization.
我们希望避免在没有明确授权的情况下将订户转移到另一个网络的情况。


That’s why the HSS generates the K-ASME key, taking the
identity of the network asking for the key into account.
这就是为什么HSS生成K-ASME密钥,考虑到网络的身份要求考虑密钥。


Note that this network is the visited network.
请注意,此网络是访问网络。


The identity of an operator, as we’ve already
seen, is defined by the MCC/MNC pair.
正如我们已经看到的,运营商的身份由MCC / MNC对定义。


This makes it impossible
for another mobile network to use this K-ASME key.
这使得另一个移动网络无法使用此K-ASME密钥。


If the subscriber wants to use another network, it will
necessarily be after the explicit authorization of his own HSS.
如果订户想要使用另一个网络,则必须在他自己的HSS的明确授权之后。


After the exchanges with
the mobile terminal, the MME generates
another key: the K-eNodeB, based on the K-ASME key.
在与移动终端交换之后,MME基于K-ASME密钥生成另一个密钥:K-eNodeB。


It’s this key that is given to the
current eNodeB to which the mobile terminal is attaching.
这是给移动终端所连接的当前eNodeB的这个密钥。


As for the mobile terminal, the SIM card generates the
K-ASME key, which it passes to the mobile terminal
itself, which then deduces the K-eNodeB key.
对于移动终端,SIM卡生成K-ASME密钥,然后将其传递给移动终端本身,然后移动终端推断出K-eNodeB密钥。


The K-ASME and K-eNodeB keys are not used
directly to protect exchanges.
K-ASME和K-eNodeB密钥不直接用于保护交换。


They are used as the base to generate the set
of keys necessary for the integrity and ciphering of exchanges.
它们被用作生成交换的完整性和加密所必需的密钥集的基础。


Several keys are generated from the K-ASME key:
The encryption key and the key for integrity
between the MME and the mobile terminal; the
abbreviation NAS (Non Access Stratum) indicates
that these keys are between the mobile terminal and the MME.
从K-ASME密钥生成若干密钥:加密密钥和MME与移动终端之间的完整性密钥; 缩写NAS(Non Access Stratum)表示这些密钥位于移动终端和MME之间。


Next, the protection of signaling
messages between the mobile terminal and the eNodeB,
ciphering and integrity, as well as the
encryption key for user data.
接下来,保护移动终端和eNodeB之间的信令消息,加密和完整性,以及用户数据的加密密钥。


The abbreviation RRC indicates that these keys are
for signaling between the mobile terminal and the eNodeB
while the abbreviation UP (User Plane)
indicates that these keys are for user packets.
缩写RRC表示这些密钥用于移动终端和eNodeB之间的信令,而缩写UP(用户平面)指示这些密钥用于用户分组。


We’ll see in the rest of the course what these
abbreviations stand for.
我们将在课程的其余部分看到这些缩写代表什么。


But, what is the mechanism
with which we can derive these keys and build up such a hierarchy?
This hierarchy of keys is built on an ingenious
use of cryptographic hash functions.
但是,我们可以通过什么机制派生这些密钥并构建这样的层次结构?这种密钥层次结构建立在巧妙使用加密哈希函数的基础之上。


A function like this takes as parameters
a secret key and the data to produce the result.
像这样的函数将秘密密钥和数据作为参数,以产生结果。


Because the output is of a fixed sized, and,
thanks to the properties of cryptographic hash functions,
the output itself can be treated like a key.
因为输出是固定大小的,并且由于加密散列函数的属性,输出本身可以被视为键。


Then, the K-ASME key is
calculated using the secret K, taking as input the
random number RAND, identifying the operator and the SQN number.
然后,使用秘密K计算K-ASME密钥,将随机数RAND作为输入,识别运算符和SQN号。


In turn, the K-ASME key is used as a shared
secret to generate the K-eNodeB key.
反过来,K-ASME密钥用作生成K-eNodeB密钥的共享秘密。


And so on to generate the entire hierarchy
which protects exchanges between the terminal
and the network.
等等,以生成保护终端和网络之间交换的整个层次结构。

转载于:https://www.cnblogs.com/sec875/articles/9906601.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值