A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols [chapter]

Joe-Kai Tsay, Stig F. Mjølsnes
2012 Lecture Notes in Computer Science  
We report on a deficiency in the specifications of the Authentication and Key Agreement (AKA) protocols of the Universal Mobile Telecommunications System (UMTS) and Long-Term Evolution (LTE) as well as the specification of the GSM Subscriber Identity Authentication protocol, which are all maintained by the 3rd Generation Partnership Program (3GPP), an international consortium of telecommunications standards bodies. The flaw, although found using the computational prover CryptoVerif, is of
more » ... ic nature and can be exploited by both an outside and an inside attacker in order to violate entity authentication properties. An inside attacker may impersonate an honest user during a run of the protocol and apply the session key to use subsequent wireless services on behalf of the honest user.
doi:10.1007/978-3-642-33704-8_6 fatcat:jnny6idbsfainm4jmmhmkpp3q4