H.9 Protected negotiation of IOV values
3GPP43.020Release 17Security related network functionsTS
H.9.1 Protected IOV container
The protected IOV container is composed by the follow three components:
– The new IOV values (as specified in TS 44.064 [20], see e.g. clause 8.9.2).
– The value of IOV_updates counter that was used in the calculation of MAC-IOV.
– The MAC-IOV value calculated over the new IOV values and the value of IOV_updates counter.
After a successful authentication, both the MS and the eSGSN shall store a local counter "IOV_updates" showing the number of IOV_updates since the previous authentication. The initial value of the counter is 0, and it is incremented by 1 every time the eSGSN updates the IOV values, regardless whether it updates IOV-UI only, i-IOV-UI only, or both IOV-UI and i-IOV-UI. In the first protected IOV container, the IOV_ updates counter shall be 1. The IOV_ updates counter in the MS side represents the number of successful IOV_updates, and may have smaller value than the IOV_ updates counter maintained in the eSGSN.
The MAC-IOV is calculated with the following inputs:
– The integrity protection algorithm shall be the same GIA algorithm that is already used at the MS for integrity protection at LLC layer; if there is no integrity algorithm in place at the MS at LLC layer, then the integrity algorithm shall be the same GIA algorithm that was just negotiated at GMM layer;
– The integrity key shall be the same integrity key Ki128 that is already used for integrity protection at LLC layer;
– All Input-I bits shall be set to the value of the IOV_updates counter;
– MESSAGE shall be set to the value part(s) of the new IOV value(s) (see TS 44.064 [20], clause 6.4.1.6); if more than one IOV value is included in the protected IOV container, the value parts shall be concatenated in the same order of sequence as included in the LLC XID command message;
– DIRECTION bit shall be set to 1;
– The FRAMETYPE (needed for the CONSTANT-F calculation) is set to 254;
The MAC-IOV shall be the 32 least significant bits of the output of the used integrity algorithm.
H.9.2 LLC XID procedure with protected IOV container
The following description in this clause is only applicable to the LLC XID procedure in LLC layer protocol when constructing and verifying the protected IOV container. The eSGSN shall always send the IOV values in the protected IOV container to the MS. Protection is provided only towards the MS in the LLC XID command, and the LLC XID response from the MS towards the eSGSN includes no protection. The procedure is demonstrated in figure H.9.2-1.
Figure H.9.2-1: LLC XID procedure with protected IOV container
The eSGSN shall construct and include the protected IOV container in the LLC XID command message to the MS. The protected IOV container is to be used for integrity protection and replay protection of the new IOV values. The MAC-IOV is a message authentication code that protects the integrity of the IOV values carried in the LLC XID command message. The IOV_updates provides replay protection to the IOV values. The IOV values may include IOV-UI only, i-IOV-UI only, or both IOV-UI and i-IOV-UI.
The LLC layer in the MS checks and verifies the MAC-IOV received in LLC XID command message. The MS shall confirm that the IOV_updates value received in the LLC XID command is greater than the local IOV_updates counter maintained in the MS. If the IOV_updates value in the received message is acceptable, and the verification of the MAC-IOV is successful then the MS replaces its local value of the IOV_updates counter with the new one that was received in the LLC XID command message, and replies with a LLC XID response message sent without replay and integrity protection.
If the MS receives a LLC XID command message updating the IOV parameters without a MAC-IOV parameter, or the received IOV_updates value is smaller or equal to the local IOV-updates counter maintained in the MS, then the MS shall silently discard the message.
If the verification of the MAC-IOV received in the LLC XID message is not successful in the MS, then the MS shall silently discard the message.
The LLC XID response to the LLC XID comman carrying the protected IOV container includes no protection.
Annex I (informative):
Change history
Change history |
||||||||
---|---|---|---|---|---|---|---|---|
Date |
TSG # |
TSG Doc. |
CR |
Rev |
Subject/Comment |
Cat |
Old |
New |
Nov 2000 |
– |
– |
– |
– |
Transferred to 3GPP as 3GPP TS 43.020 version 4.0.0 (Release 4) |
– |
9.0.0 |
4.0.0 |
July 2002 |
SA#16 |
– |
– |
– |
– |
4.0.0 |
5.0.0 |
|
Sept 2004 |
SP-25 |
SP-040615 |
0001 |
– |
Introducing VGCS/VBS ciphering (Creation of Rel-6 version) |
B |
5.0.0 |
6.0.0 |
Sept 2004 |
– |
– |
– |
– |
General editorial changes and Annex G created from clause F.7 (MCC) |
– |
5.0.0 |
6.0.0 |
Dec 2004 |
SP-26 |
SP-040862 |
0002 |
2 |
Clarifications to VGCS/VBS ciphering mechanism |
F |
6.0.0 |
6.1.0 |
Dec 2004 |
SP-26 |
SP-040862 |
0002 |
2 |
Clarifying the support of algorithms within mobile stations |
C |
6.0.0 |
6.1.0 |
2005-09 |
SP-29 |
SP-050567 |
0004 |
– |
Correction of USIM based ciphering on dedicated channels |
F |
6.1.0 |
6.2.0 |
2005-09 |
SP-29 |
SP-050566 |
0005 |
– |
Correction on service specific group keys |
F |
6.1.0 |
6.2.0 |
2005-09 |
SP-29 |
SP-050550 |
0006 |
– |
Clarify ciphering for A5 algorithms that do not produce bit after bit output. |
F |
6.1.0 |
6.2.0 |
2006-03 |
SP-31 |
SP-060050 |
0009 |
– |
Correction of a reference |
F |
6.2.0 |
6.3.0 |
2006-06 |
SP-32 |
SP-060377 |
0012 |
– |
Correction and clarification of requirements relating to A5 algorithm support |
F |
6.3.0 |
6.4.0 |
2007-06 |
SP-36 |
– |
– |
– |
Update to Rel-7 version (MCC) |
– |
6.4.0 |
7.0.0 |
2007-09 |
SP-37 |
SP-070592 |
0016 |
1 |
Miscellaneous corrections to the specification of the A5 algorithm in the 8-PSK case |
F |
7.0.0 |
7.1.0 |
2007-12 |
SP-38 |
SP-070784 |
0022 |
– |
Allowing new A5 algorithms to be introduced in future releases |
A |
7.2.0 |
7.3.0 |
2008-07 |
— |
— |
— |
– |
Correction of history |
– |
7.3.0 |
7.3.1 |
2008-12 |
SP-42 |
— |
— |
— |
Upgrade to Release 8 |
– |
7.3.1 |
8.0.0 |
2009-09 |
SP-45 |
SP-090635 |
0025 |
1 |
Introduction of A5/4 and GEA4 |
B |
8.0.0 |
9.0.0 |
2009-09 |
SP-46 |
SP-090821 |
0026 |
1 |
algorithm selection for GSM subscriber in 128-bit encryption |
F |
9.0.0 |
9.1.0 |
2011-03 |
– |
– |
– |
– |
Update to Rel-10 version (MCC) |
— |
9.1.0 |
10.0.0 |
2011-06 |
SP-52 |
SP-110268 |
0028 |
– |
A5/3 and A5/4 support in GSM |
B |
10.0.0 |
11.0.0 |
2013-03 |
SP-59 |
SP-130037 |
0029 |
– |
Warning regarding GEA1 support in mobile stations |
F |
11.0.0 |
11.1.0 |
2013-03 |
SP-59 |
SP-130037 |
0030 |
– |
Prohibiting GEA1 in mobile stations |
C |
11.1.0 |
12.0.0 |
2014-06 |
SP-64 |
SP-140311 |
0031 |
2 |
Kc128 derivation at intra GERAN mobility |
A |
12.0.0 |
12.1.0 |
2016-01 |
– |
– |
– |
– |
Update to Rel-13 version (MCC) |
12.1.0 |
13.0.0 |
|
2016-03 |
SP-71 |
SP-160054 |
0036 |
1 |
Access security related functions for enhanced General Packet Radio Service in relation to Cellular Internet of Things |
B |
13.0.0 |
13.1.0 |
Change history |
|||||||
Date |
Meeting |
TDoc |
CR |
Rev |
Cat |
Subject/Comment |
New version |
2016-06 |
SA#72 |
SP-160388 |
0037 |
– |
F |
Change the name of the feature to EC-GSM-IoT |
13.2.0 |
2016-06 |
SA#72 |
SP-160388 |
0038 |
1 |
F |
Clarification on optional inclusion of user plane integrity indication in MS network capability |
13.2.0 |
2016-06 |
SA#72 |
SP-160388 |
0040 |
1 |
F |
Adding procedural details for ciphering and integrity mode negotiation |
13.2.0 |
2016-06 |
SA#72 |
SP-160388 |
0041 |
1 |
F |
Adding details for new cellular algorithms GIA4, GEA5 and GIA5 |
13.2.0 |
2016-06 |
SA#72 |
SP-160388 |
0042 |
– |
F |
The definition of MAC-GMM in GMM Authentication and Ciphering Request and GMM Authentication and Ciphering Response |
13.2.0 |
2016-06 |
SA#72 |
SP-160388 |
0044 |
– |
F |
Allocation of FC value to derivation of Ki128 and other changes |
13.2.0 |
2016-06 |
SA#73 |
SP-160581 |
0048 |
1 |
F |
Corrections to EASE |
13.3.0 |
2016-06 |
SA#73 |
SP-160581 |
0049 |
1 |
F |
Secure delivery of IOV-values to the MS in enhanced GPRS |
13.3.0 |
2016-06 |
SA#73 |
SP-160580 |
0047 |
1 |
B |
GSM secuirty improvements |
14.0.0 |
2016-12 |
SA#74 |
SP-160783 |
0053 |
1 |
A |
Clarification related to the LLC acknowledge mode |
14.1.0 |
2017-03 |
SA#75 |
SP-170105 |
0055 |
– |
A |
Correction of protected IOV container |
14.2.0 |
2017-06 |
SA#76 |
SP-170432 |
0056 |
1 |
A |
Adding references to GIA4, GEA5/GIA5 and stage 3 GMM specifications, and removing corresponding editor’s notes. |
14.3.0 |
2018-06 |
– |
– |
– |
– |
– |
Update to Rel-15 version (MCC) |
15.0.0 |
2020-07 |
– |
– |
– |
– |
– |
Update to Rel-16 version (MCC) |
16.0.0 |
2021-06 |
SA#92e |
SP-210448 |
0058 |
1 |
A |
Removal of GEA2 due to security concerns |
16.1.0 |
2022-03 |
– |
– |
– |
– |
– |
Update to Rel-17 version (MCC) |
17.0.0 |