Term
| What does GSM provide security for? |
|
Definition
|
|
Term
| What was the purpose of designing GSM? |
|
Definition
| To be as secure as wired networks |
|
|
Term
| When was lawful interception considered? |
|
Definition
|
|
Term
| Where the limitations of GSM considered? |
|
Definition
|
|
Term
| Why was radio channel hijack still a problem? |
|
Definition
| Because it relies on encryption, but encryption isn't necessarily used |
|
|
Term
| Where is trust misplaced? |
|
Definition
| Terminal identity, it's an unsecured environment |
|
|
Term
| GSM is inflexible, what does this mean? |
|
Definition
| Hard to upgrade and improve security function over time |
|
|
Term
|
Definition
| There is none that security is being applied |
|
|
Term
| There's 4 problems with the crypto, what are they? |
|
Definition
Lack of opennes in design of A5/1
Misplaced belief in the effectiveness of crypto
Key length is too short but hard to be updated
THe frames are XORed with the keystream |
|
|
Term
| Summarise the limitations of GSM Security (9) |
|
Definition
There's only access security
Not addressing active attacks
Only as secure as fixed networks
Lawful interception was an afterthought
The encryption that was needed to guard against radio channel hijack isn't necessarily used
Trust in the terminal identity is misplaced
Inadequate flexibility to upgrade and improve security
Lack of visibility
Shit crypto |
|
|
Term
|
Definition
- Cryptography ended too quickly - Shit crypto - You can camp on a false BTS - Network keys are sent in cleartext |
|
|
Term
|
Definition
- Eavesdropping - Impersonation of user - Impersonation of network - Man in the middle - Compromising auth vectors |
|
|