Course Number: 545
Length: 2 Days
GERAN, HSPA/HSPA+ and LTE Security Training
Having completed this course the participant will be able to understand how security is implemented, deployed and managed in GSM, GPRS, UMTS/HSPA/HSPA+, LTE/EPC networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented.
Who Should Attend
Anyone needing in-depth knowledge of the security in the GSM family of wireless networks. The course is essential for network security & wireless specialists, operators and manufacturers, wireless network researcher, academics, security engineers, researchers and consultants.
Objectives
The goal of this course is to give the participant a strong and intuitive understanding of what security in the wireless systems is and how the security functions are implemented in the GSM/GPRS/UMTS radio and core network. The course focuses both on the air interface and the core network.
Outline
Security Overview
- Basic security concepts
- Authentication
- Privacy
- Integrity
- Authorization
- Non-repudiation
Encryption
- Encryption Technologies
- Cryptography Keys
- Symmetric and Asymmetric
- Ciphers
- Cipher Suites
- Certificates
Overview of Wireless Security Requirements
- Wireless security needs
- Basic GSM, GPRS and UMTS security functions
GSM Security Review
- GSM security algorithms
- GSM authentication and authorization procedures
- GSM ciphering procedures
- Security threats to GSM
GPRS Security Review
- GPRS security algorithms
- GSM authentication and authorization procedures
- GPRS ciphering procedures
- Kasumi, GEA1, GEA2 and GEA3
- Security threats to GPRS
UMTS Security Review
- Security in UTRAN
- Security in the UMTS Core Network
- UMTS security algorithms
- UMTS authentication and authorization procedures
- UMTS ciphering procedures
- Security threats to UMTS
UMTS Authentication and Key Management
- AKA Algorithms
- Normal AKA procedure
- AKA procedure in the AuC
- AKA procedure in the USIM
- AKA procedure in the VLR/SGSN
- Integrity function f9, Confidentiality function f8
- Milenage and KASUMI algorithms