| Preface | xi |
1 | Introduction | 1 |
2 | Cryptography | 5 |
2.1 | Introduction | 5 |
2.2 | Basic Concepts | 5 |
2.2.1 | Ciphertext and Plaintext | 5 |
2.2.2 | Types of Cryptosystems | 6 |
2.2.3 | Goals of a Cryptosystem | 7 |
2.2.4 | Security | 8 |
2.3 | Symmetric Encryption Schemes | 9 |
2.4 | Perfect Secrecy: The One-Time Pad | 9 |
2.5 | Block Ciphers | 11 |
2.5.1 | Permutation | 11 |
2.5.2 | Substitution | 12 |
2.5.3 | Diffusion/Confusion | 13 |
2.5.4 | SP Networks | 14 |
2.5.5 | Basic Structure | 14 |
2.5.6 | Modes of Use | 15 |
2.5.7 | DES | 17 |
2.5.8 | AES | 18 |
2.6 | Stream Ciphers | 19 |
2.6.1 | Advantages | 20 |
2.6.2 | Security Remarks | 20 |
2.6.3 | Some Examples | 21 |
2.7 | Asymmetric Cryptosystems and Digital Signatures | 21 |
2.7.1 | Public-Key Encryption | 22 |
2.7.2 | Public Key Infrastructure (PKI) and Certificate Authorities (CA) | 23 |
2.7.3 | Mathematical Background | 25 |
2.7.4 | Diffie-Hellman Key Agreement | 27 |
2.7.5 | RSA Cryptosystem | 28 |
2.7.6 | ElGamal Cryptosystem | 29 |
2.7.7 | Necessary Security for Practical Public Key Encryption Systems | 31 |
2.7.8 | Digital Signature | 32 |
2.7.9 | Mathematical Background | 33 |
2.7.10 | RSA Signature Scheme | 35 |
2.7.11 | Digital Signature Algorithm (DSA) | 36 |
2.7.12 | Necessary Security for Practical Digital Signature Systems | 36 |
| References | 38 |
3 | Security Features in Wireless Environment | 41 |
3.1 | Introduction | 41 |
3.2 | Mobile Network Environment | 42 |
3.3 | General Security Threats of a Network | 44 |
3.4 | Limitations of Mobile Environment | 45 |
3.5 | Mobility and Security | 46 |
3.6 | Attacks in Mobile Environment | 46 |
3.6.1 | Nuisance Attack | 47 |
3.6.2 | Impersonation Attack | 48 |
3.6.3 | Interception Attack | 48 |
3.6.4 | Replay Attack | 48 |
3.6.5 | Parallel Session Attack | 48 |
3.7 | Security Issues in Mobile Environment | 49 |
3.7.1 | Authentication | 49 |
3.7.2 | Anonymity | 50 |
3.7.3 | Device Vulnerability | 52 |
3.7.4 | Domain Boundary Crossing | 52 |
| References | 53 |
4 | Standard Protocols | 55 |
4.1 | IEEE 802.11 | 55 |
4.1.1 | Brief History | 55 |
4.1.2 | IEEE802.11 Architecture | 56 |
4.1.3 | IEEE 802.11 Layers | 60 |
4.1.4 | Security of IEEE 802.11 | 62 |
4.1.5 | Key Management | 69 |
4.1.6 | Weaknesses of WEP | 70 |
4.2 | Bluetooth | 72 |
4.2.1 | Bluetooth Overview | 72 |
4.2.2 | Brief History | 73 |
4.2.3 | Benefits | 74 |
4.2.4 | Bluetooth Architecture and Components | 76 |
4.2.5 | Security of Bluetooth | 78 |
4.2.6 | Problems in the Security of Bluetooth | 89 |
| Reference | 90 |
5 | Security in 2G Systems | 91 |
5.1 | GSM System | 92 |
5.1.1 | Introduction | 92 |
5.1.2 | Architecture of the GSM Network | 93 |
5.1.3 | GSM Security Features | 96 |
5.1.4 | Attacks on GSM Security | 103 |
5.2 | I-mode Introduction | 106 |
5.2.1 | Introduction | 106 |
5.2.2 | I-mode System Overview | 107 |
5.2.3 | SSL Overview | 108 |
5.2.4 | Protocol Stack | 110 |
5.2.5 | HTTP Tunneling Protocol | 114 |
5.2.6 | Postscript | 116 |
5.3 | CDPD | 116 |
5.3.1 | Introduction | 116 |
5.3.2 | Basic Idea | 118 |
5.3.3 | Basic Infrastructure | 119 |
5.3.4 | How a CDPD Connection Works | 122 |
5.3.5 | CDPD Security | 125 |
| References | 129 |
6 | Security in 3G and 4G Systems | 131 |
6.1 | 3G Wireless Communications Systems | 131 |
6.2 | Third Generation Partnership Project (3GPP) | 133 |
6.2.1 | 3GPP Security Objectives | 133 |
6.3 | 3G Security Architecture | 134 |
6.3.1 | Network Access Security | 135 |
6.3.2 | Network Domain Security | 136 |
6.3.3 | User Domain Security | 136 |
6.3.4 | Provider-User Link Security | 136 |
6.3.5 | Visibility and Configurability of Security | 137 |
6.4 | Authentication and Key Agreement (AKA) in 3GPP | 137 |
6.5 | Confidentiality and Integrity | 138 |
6.5.1 | Confidentiality | 139 |
6.5.2 | Data Integrity | 140 |
6.6 | 4G Wireless Communications Systems | 141 |
| References | 142 |
7 | Wireless Application Protocol (WAP) | 143 |
7.1 | Introduction | 143 |
7.2 | WAP Protocol Stack | 144 |
7.3 | WAP PKI Model | 147 |
7.3.1 | WTLS Class 2 | 148 |
7.3.2 | WTLS Class 3 and SignText | 152 |
7.4 | Cipher Suite in WTLS | 156 |
7.4.1 | Key Exchange Suite | 156 |
7.4.2 | Elliptic Curve Parameters in WTLS | 160 |
7.4.3 | Bulk Encryption and MAC Suite | 161 |
7.5 | WAP-Profiled TLS | 163 |
7.5.1 | Cipher Suites | 164 |
7.5.2 | Session ID and Session Resume | 167 |
7.5.3 | Server/Client Authentication and Certificate | 168 |
7.5.4 | TLS Tunneling | 168 |
7.6 | WAP Identity Module | 169 |
7.7 | Further Information | 170 |
| References | 171 |
| About the Authors | 175 |
| Index | 177 |