tetra security meeting needs of military

25
TETRA Security meeting needs of Military Security mechanisms in TETRA and how to ensure that the solution is secure… ”Jeppe” Jepsen Motorola

Upload: travis

Post on 05-Feb-2016

68 views

Category:

Documents


2 download

DESCRIPTION

TETRA Security meeting needs of Military. Security mechanisms in TETRA and how to ensure that the solution is secure… ”Jeppe ” Jepsen M otorola. What we want to achieve with Security. Confidentiality No one can eavesdrop on what we are saying Authenticity - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: TETRA Security meeting needs of Military

TETRA Security meetingneeds of Military

Security mechanisms in TETRA

and how to ensure that the

solution is secure…

”Jeppe” Jepsen

Motorola

Page 2: TETRA Security meeting needs of Military

What we want to achieve with SecurityConfidentiality

– No one can eavesdrop on what we are saying

Authenticity– The people we are talking to are the right people– The wrong people can’t try and join us

Integrity– The information gets there completely intact

Availability– Communications are possible where and when

they are needed

Accountability (Non repudiation)– Whoever said something, can’t deny it later

Page 3: TETRA Security meeting needs of Military

Threats to communication and the threats to security

Message related threats– interception, eavesdropping, masquerading,

replay, manipulation of data

User related threats– traffic analysis, observability of user behavior

System related threats– denial of service, jamming, unauthorized use of

resources

Page 4: TETRA Security meeting needs of Military

Key Functions of TETRA SecurityTETRA has several security features allowing most customers

security needs to be met in a cost efficient way.

– Authentication - ensures only valid subscriber units have access to the system and subscribers will only try and access the authorized system

– Air Interface Encryption – protects all signalling, identity and traffic across the radio link

– End-to-End Encryption - protects information as it passes through the system

Base Station Infrastructure

Dispatcher

“????”“????”

1. Authentication1. Authentication

2. Air Interface Encryption2. Air Interface Encryption

3. End3. End--toto--End EncryptionEnd Encryption

“XYZ”

Base Station

Page 5: TETRA Security meeting needs of Military

Authentication

Authentication provides proof identity of all radios attempting use of the network

Radio can authenticate the network in turn, protects against ‘fake base stations’ etc

A session key system from a central authentication centre allows highly secure key storage

– Secret key need never be exposed

Authentication process derives air interface key (TETRA standard) – automatic key changing!

MS

Switch

Session keysChallenge

Authentication Centre

Mutual Challenge

Calculated Response

Calculated Response

Secret keys

Page 6: TETRA Security meeting needs of Military

Radio Security Provisioning And Key Storage

TETRA MoU SFPG Recommendation 01 provides a standardised format for importing authentication and other air interface encryption keys

Use of Recommendation 01 files will allow multi vendor terminal supply

Separation of logical key programming step from factory can allow all keys to be loaded in country– Meets national security requirements

Factory

Key Programming

TEI

TEI

K K, TEI

AuCStandardised formatImports key material from any vendor

TETRASwMI

SCK, GCK etc…from national security authority

Page 7: TETRA Security meeting needs of Military

What is Air Interface Encryption?First level encryption used to protect information over the Air Interface

– Typically software implementation– Protects almost everything – speech, data, signalling, identities…

3 different Classes– Class 1

• No Encryption, can include Authentication

– Class 2• Static Cipher Key Encryption, can include Authentication

– Class 3– Dynamic Cipher Key Encryption

– Individual Derived Cipher Key– Common Cipher Key– Group Cipher Key

– Requires Authentication

Includes over the air key management protocols– Allows seamless key management

Page 8: TETRA Security meeting needs of Military

The purpose of Air Interface Encryption

OperationalInformation

ClearClearAirAir

Interface!Interface!

The air interface was considered vulnerable.

Network fixed links are considered difficult to intercept.

Air Interface encryption was designed to make the air interface as secure as the fixed line connection

Page 9: TETRA Security meeting needs of Military

Important properties of Air Interface encryption

Many threats other than eavesdropping– traffic analysis, observance of user behaviour

AIE protects control channel messages and identities as well as voice and data payloads– End to end encryption - if used alone - is insufficient (it only protects

the voice payload)

Continuous authentication– Encryption key generated from authentication process

Encrypted registration protects ITSIs even at switch onSecurity classes can be changed in operation – essential for

fallback measures if authentication cannot operate

Page 10: TETRA Security meeting needs of Military

End to end encryption in TETRAETSI Project TETRA provides standardised support for end to end Encryption

– ETSI EN302109 contains specific end to end specification– Ensures TETRA provides a standard alternative to proprietary offerings

and technologies– Ensures compatibility between infrastructures and terminals

Many organisations want their own algorithm– Confidence in strength– Better control over distribution

TETRA MoU – Security and fraud Protection Group– Provides detailed recommendation on how to implement end to end

encryption in TETRA

The result – Standardisation and compatibility, with choice of algorithm– A big strength of TETRA

Page 11: TETRA Security meeting needs of Military

End To End Encryption ‘Standardisation’

TETRA MoU SFPG Recommendation 02– Framework for end to end encryption– Recommended synchronisation method for speech calls– Protocol for Over The Air Keying– Sample implementations including algorithm mode and key

encryption for IDEA, but AES128 is now preferred– DOES NOT specify implementation – can be implemented

with module, software, SIM card etc..– DOES NOT provide module interface specification

Page 12: TETRA Security meeting needs of Military

Related RecommendationsTETRA MoU SFPG Recommendation 01

– Key transfer specification– Currently being updated to include end to end encryption

key import formats

TETRA MoU SFPG Recommendation 07– Short data service encryption– Currently being updated to reflect larger algorithm block sizes, e.g. 128 bits for AES

TETRA MoU SFPG Recommendation 08– Framework for dividing encryption functionality between a SIM (smartcard) and a radio– No defined bit level interface (export control issue)

TETRA MoU SFPG Recommendation 11– IP Packet data encryption– Work in process– Will provide a suitable means for high security packet data encryption, with commonality

with voice encryption

Page 13: TETRA Security meeting needs of Military

Implementing TETRA securityTETRA security measures are by no means the complete

pictureHow well they are implemented – and how the

implementation is evaluated is criticalThe rest of the network – what else connects to TETRA – is

equally importantThe operational process and procedures equally provide

countermeasures to the threats

Landline

TETRANetwork

OtherNetwor

k OtherNetwor

k OtherNetwor

k

Link

Page 14: TETRA Security meeting needs of Military

Implementation considerations – Air Interface Encryption

AIE should provide security equivalent to the fixed networkThere are several issues of trust here

– Do I trust that the AIE has been implemented properly?– Does AIE always operate (during registration, in fallback modes

etc)?– Do I trust the way that the network (or radio) stores keys?– Do I trust the fixed network itself or can someone break in?

A strong AIE implementation and an evaluated network can provide essential protection of information

An untested implementation and network may need reinforcing, for example with end to end encryption

Page 15: TETRA Security meeting needs of Military

Useful Recommendations

TETRA MoU SFPG Recommendation 03 – TETRA threat analysis– Gives an idea of possible threats and countermeasures

against a radio systemTETRA MoU SFPG Recommendation 04 – Implementing

TETRA security features– Provides guidance on how to design and configure a TETRA

systemBoth documents are restricted access requiring Non

Disclosure Agreement with SFPG

Page 16: TETRA Security meeting needs of Military

Assuring your security solution

There are two important steps in assuring the security of the solution: Evaluation and Accreditation

Evaluation of solutions should be by a trusted independent body– Technical analysis of design and implementation

Accreditation is the continual assessment of risks – Assessment of threats vs solutions

• Procedural and technical solutions– Should be undertaken by end user representative

Page 17: TETRA Security meeting needs of Military

Maximising cost effectiveness

Evaluation can be extremely expensive – how to get best value for money?

Establish the requirements in advance– as far as they are known – security is always a changing

requirement!Look for suppliers with track record and reputation Look for validations of an equivalent solution elsewhereConsider expert help on

processes and procedures

Page 18: TETRA Security meeting needs of Military

Summary: The essentials of a secure system

A strong standard

A good implementation

Experienced supplier

Trusted evaluation

Continual assessment of threats and solutions

Standard

EVALUATED

Page 19: TETRA Security meeting needs of Military
Page 20: TETRA Security meeting needs of Military

Military Operational Requirements (MOR)

NATO C3 Board has approved the MOR from a policy point of view

MOR has to be implemented in 2002-2006

MOR covers the use of Mobile Communications for Support Elements of NATO Activities

The MOR addresses the use of Mobile Communications, within a non-hostile environment, allowing interoperability with systems of other NATO Forces, PfP nations and civil organisations, ensuring an appropriate level of security

Page 21: TETRA Security meeting needs of Military

NC3A SET - 2 SHF SATCOM Terminal

13 meter antenna located in the dunes near Nc3A-NL

connected to the SATIN lab

typical of a large NATO SGT

Page 22: TETRA Security meeting needs of Military

Example 4: SET 12 (System parameters)

Diameter size of the dish 1.2 mTransmit Gain: 37 dBiG/T 13 dB/KMaximal EIRP 55 dBWPower: 100 Wantenna tracking (open loop)controlled via a laptop (rs 232)

transportable , 6 transit cases, total weight < 350 kgfast setup and teardown by 2 persons

Datarate depends on link budget and allocated resource128 kbps duplex between Set 2 and Set 12 in Denmark on NATO IV

Page 23: TETRA Security meeting needs of Military

TETRA Extension Demonstration

64/128 kbps64/128 kbps

TETRABS

TETRABS modemmodem modemmodem

NATO IV (channel 4)

Copenhagen : SET 12RS 449

RS 449 interface(satcom boundary)

TETRA SwitchTETRA Switch

NC3A-NL

Page 24: TETRA Security meeting needs of Military

What security level do you want?•TETRA Class 1•TETRA Class 2•TETRA Class 3•TETRA w/ E2E algoritm on Smart Card •TETRA w/ E2E SW algorithm in radio•TETRA w/ E2E hardware solution using AES128•TETRA w/ E2E hardware solution using own algorithm

TETRA is @ your Service

Page 25: TETRA Security meeting needs of Military

www.motorola.com/[email protected]

m

Thank You

www.etsi.orgwww.tetramou.com