Content deleted Content added
Rescuing 2 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
|||
(35 intermediate revisions by 30 users not shown) | |||
Line 1:
GBA is standardized at the [[3GPP]] (http://www.3gpp.org/ftp/Specs/html-info/33220.htm)
▲In mobile phones, '''Generic Bootstrapping Architecture''' (GBA) is one technology enabling the authentication of a user. This authentication is possible if the user owns a valid identity on an HLR [[GSM_core_network#Home_Location_Register_.28HLR.29|Home Location Register]] or a [[Home Subscriber Server]]
GBA authenticates by making a network component challenge the
▲GBA is standardized at the [[3GPP]] (http://www.3gpp.org/ftp/Specs/html-info/33220.htm) . The user authentication is instantiated by a shared secret, one in the [[smartcard]] inside the mobile phone and the other is on the HLR/HSS.
Instead of asking the service provider to trust the [[Bootstrapping Server Function|BSF]] and relying on it for every authentication request, the [[Bootstrapping Server Function|BSF]] establishes a shared secret between the [[simcard]] card and the service provider. This shared secret is limited in time and for a specific ___domain.
▲GBA authenticates by making a network component challenge the [[simcard]] card and verify that the answer is similar by the one predicted by the HLR/HSS.
[[Image:Generic Bootstrapping Architecture.jpg]]
▲Instead of asking the service provider to trust the [[Bootstrapping Server Function|BSF]] and relying on it for every authentication request, the [[BSF]] establishes a shared secret between the [[simcard]] card and the service provider. This shared secret is limited in time and for a specific ___domain.
==Strong points==
This solution has some strong points of certificate and shared secrets without having some of their weaknesses:
- There is no need for user enrollment phase nor secure deployment of keys, making this solution a very low cost one when compared to [[Public key infrastructure|PKI]].
- Another advantage is the ease with which the authentication method may be integrated into terminals and service providers, as it is based on [[HTTP]]'s well known "[[Digest access authentication]]". Every Web server already implement HTTP [[digest authentication]] and the effort to implement GBA on top of digest authentication is minimal. For example, it could be implemented on SimpleSAMLPhP http://rnd.feide.no/simplesamlphp {{Webarchive|url=https://web.archive.org/web/20081219004332/http://rnd.feide.no/simplesamlphp |date=2008-12-19 }} with 500 PHP lines of code and only a few tens of
- On device side is needed:
Line 23 ⟶ 20:
* A means to dialog with a smartcard and signed the challenge sent by the BSF, either Bluetooth SAP or a Java or native application could be used to serve the request coming from the browser.
== Technical overview
Actually, contents in this section are from external literature.<ref>{{Cite web |url=http://www.tml.tkk.fi/Publications/C/22/papers/Olkkonen_final.pdf |title=Generic Authentication Architecture by Timo Olkkonen, Helsinki University of Technology |access-date=2010-07-05 |archive-date=2016-07-05 |archive-url=https://web.archive.org/web/20160705130421/http://www.tml.tkk.fi/Publications/C/22/papers/Olkkonen_final.pdf |url-status=dead }}</ref>
There are two ways to use GAA (Generic Authentication Architecture).
* The first, GBA, is based on a shared secret between the client and server
* The second, SSC, is based on public-private key pairs and digital certificates.
In the shared secret cases, the customer and the operator are first mutually authenticated through 3G and
This is called
After that, the services can retrieve the
network and borders dotted the scoreboard. The User Equipment (
'''Bootstrapping
BSF retrieves data from the subscriber from the Home Subscriber Server (HSS) during the Zh [3] interface, which uses the
[[
▲Nafs recover the key session of BSF during the Zn interface, which also uses the diameter at the base Protocol [5]. If
▲NFA is not in the home network, it must use a proxy-Zn contact BSF .
== Uses ==
* The SPICE project developed an extended Use Case named "split terminal" where a user on a PC can authenticate with
* The research institute [[Fraunhofer
* The Open Mobile Terminal Platform http://www.omtp.org references GBA in its Advanced Trusted Environment: OMTP TR1<ref>
Sadly, despite many advantages and potential uses of GBA, its implementation in handsets has been limited since GBA standardization in 2006. Most notably, GBA was implemented in Symbian-based handsets.
== References == ▼
{{Reflist}}▼
▲{{Reflist}}
[[Category:Cryptographic protocols]]
|