Cloning 3G/4G SIM Cards With A PC And An Oscilloscope: Lessons Learned In Physical Security

  Рет қаралды 54,274

Black Hat

Black Hat

8 жыл бұрын

by Yu Yu
Recently, documents leaked from Edward Snowden alleged that NSA and GCHQ had stolen millions of SIM card encryption keys from one of the world's largest chip manufacturers. This incident draws the public attention to the longstanding concern for the mobile network security. Despite that various attacks against 2G (GSM) algorithms (COMP-128, A5) were found in literature, no practical attacks were known against 3G/4G (UMTS/LTE) SIM cards. 3G/4G SIM cards adopt a mutual authentication algorithm called MILENAGE, which is in turn based on AES-128, a mathematically secure block cipher standardized by NIST. In addition to the encryption key, MILENAGE also uses nearly a dozen of 128-bit secrets to further obfuscate the algorithm.
In this presentation, we show how to amount differential power analysis that recovers encryption key and other secrets in a divide-and-conquer manner within a few (10 to 40) minutes, allowing for SIM cards cloning. Our experiments succeeded on eight 3G/4G SIM cards from a variety of operators and manufacturers. The measurement setup of our experiment mainly consists of an oscilloscope (for power acquisition), an MP300-SC2 protocol analyzer (for interception of the messages), a self-made SIM card reader, and a PC (for signal processing and cryptanalysis). We finish the presentation by showing what happens to a 3G/4G SIM card and its duplicate when receiving texts/calls at the same time.

Пікірлер: 36
@real_rivolta
@real_rivolta
The topic was great. But the speech his was more incredible!
@erdem--
@erdem-- 4 жыл бұрын
I am just astonisheed by this. I think sim card manufacturers can prevent side channel attacks by adding small capacitors to SOC. So you can't see voltage fluctuations because at those voltage spikes, capacitors will provide energy instead of power supply.
@andy5003
@andy5003 5 жыл бұрын
Love the content nontheless.
@amjedmohamed492
@amjedmohamed492 5 жыл бұрын
Every time i read about these stuffs my brain tells me to go back 100 years T_T
@threeMetreJim
@threeMetreJim 4 жыл бұрын
I'm not that surprised the companies aren't too worried about cloning, you need physical access to the phone (and SIM card) that you want to clone. Getting that for enough time to make a clone, would most certainly be noticed by the owner and possibly have it cancelled. Only the criminals would be interested in cloning to ensure they could not be tied to a certain location - the phone IMEI number is also broadcast with each call, so you'd have to clone that too (highly illegal in most places) to guarantee anonymity by uncertainty due to numbers, a sort of
@brendonb5054
@brendonb5054 5 жыл бұрын
Can we assume that both the original phone and its clone will both receive the SMS or incoming calls? Also, this attack would require physical access to the target phone, is that correct?
@alainnkongnenwi2919
@alainnkongnenwi2919 7 жыл бұрын
Hello, Thanks for the lesson, i wish to know how to connect to my phone(sim card network) without actually connected to it physically.
@alainpannetier2543
@alainpannetier2543 7 жыл бұрын
12:33
@JohnJohn-gn4tc
@JohnJohn-gn4tc 3 жыл бұрын
How to get KI
@CMiller87
@CMiller87 3 жыл бұрын
Tim you should try to get Elon Musk to come on the show also one of the tesla power walls would be helpful on nights like this.
@angelgarcia6145
@angelgarcia6145 6 жыл бұрын
I'm afraid the English is, hard
@asaelahumada5447
@asaelahumada5447 7 жыл бұрын
hello I want your support please!!! how I can do for contact for support?
@andreab5185
@andreab5185 3 жыл бұрын
The first Chinese talking in English that I ever understood. Not joking. And I'm Italian. Now I just need to practise with Indians and I'm done.
@user-ml7gj9hg7l
@user-ml7gj9hg7l 2 жыл бұрын
thanks fullness to 👆👆very humble as well as very honest vendor.he sell:bank,PayPal transfer,spammed cc also available💯💯
@zaporniska
@zaporniska 5 жыл бұрын
Can you clone my sim carde?
@Crusader183
@Crusader183 6 жыл бұрын
His english is so terrible i do not understand anything :(
@andy5003
@andy5003 5 жыл бұрын
It's the worst English I have ever heard on KZfaq, but it's still not the worst from my experience. I don't know if I should be feeling any better.
@samjoj796
@samjoj796 Жыл бұрын
Any one Done This ? Or Any One Can Help Me With it im buying all necessary devices but i don't know about cryptology like how to decode key and opc from it any can help me ?
@user-ml7gj9hg7l
@user-ml7gj9hg7l 2 жыл бұрын
thanks fullness to 👆👆very humble as well as very honest vendor.he sell:bank,PayPal transfer,spammed cc also available💯💯
How Smartcard Payment Systems Fail
58:56
Black Hat
Рет қаралды 155 М.
How Hackers Could Wirelessly Bug Your Office
7:33
Motherboard
Рет қаралды 932 М.
I Need Your Help..
00:33
Stokes Twins
Рет қаралды 162 МЛН
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,5 МЛН
Transport Layer Security (TLS) - Computerphile
15:33
Computerphile
Рет қаралды 468 М.
SIM card - Introduction
18:45
Dr S Khan
Рет қаралды 19 М.
Total secure Russian number changing sim and voice changing pgp sim card
1:00
Hacking the Wireless World with Software Defined Radio - 2.0
1:02:19
Hacking 4G and how to get arrested in 10 minutes - Christian Sørseth
8:25
Credit card cloning is too easy!
9:07
David Bombal
Рет қаралды 3 МЛН
Explaining RISC-V: An x86 & ARM Alternative
14:24
ExplainingComputers
Рет қаралды 424 М.
The Underground Ecosystem of Credit Card Frauds
53:52
Black Hat
Рет қаралды 50 М.