Providing Voice Privacy Over Public Switched Telep
Providing Voice Privacy Over Public Switched Telep
net/publication/220722730
CITATIONS READS
2 283
2 authors, including:
Duminda Wijesekera
George Mason University
302 PUBLICATIONS 4,726 CITATIONS
SEE PROFILE
All content following this page was uploaded by Duminda Wijesekera on 08 May 2018.
Abstract: The public telephone network has been evolving from manually switched wires
carrying analog encoded voice of the 19'11 century to an automatically switched
grid of copper-wired, fiber optical and radio linked pottions catTying digitally
encoded voice and other data. Simultaneously. as our security consciousness
increases, so does our desire to keep our conversations private. Applied to the
tratTic traversing the globe on the public telephone network, privacy requires
that our telephone companies provide liS with a service whereby unintended
third parties are unable to access other's infotlllation. However. ex isting public
telephone network infrastructures do not provide such a service. This paper
proposes a security architecture that provides end-to-end voice privacy and
authentication services within the boundaties of the existing public telephone
network infrastlUctures. Proposed architecture uses public kcy cryptography for
authentication and key disttibution, and symmetric key cryptography for voice
privacy. This work is a part of an on going project on securing
telecommunication system architectures and protocols.
Key words: Public Switched Telephone Network (PSTN), Signaling System 7 (SS7),
Cettificate Authority (CA). ANSI-41 (lS-41). Global System for Mobile
Communications (GSM). Secure Telephone Unit Third Generation (STU Ill)
1 INTRODUCTION
2 RELATED WORK
Telephone services have been improving from old hand switched analog
encoded telephones to current day advance intelligent network applications.
However the security in wire-lines, otherwise known as public switched
telephone Iletwork (PTSN) is still a major concern. Currently, PTSN does not
have a system to protect against unauthorized eavesdropping of
conversations. That is not to say there is no way to conduct secure telephone
conversation in PSTN. There are several secure telephones that provide
protection againt eavesdropping in PSTN. These secure telephones are
design to work only as dedicated pairs through public telephone network
infrastructure and use predetermined symmetric keys. In addition, most of
these secure phones address only the confidentiality part of the security
Providing Voice Privacy Over Public Switched Telephone Networks 27
3.1 Authentication
Either the telephone or the AC can initiate the system authentication and
it is transparent to the subscriber. However. it will be mostly used by the AC
to authenticate the telephone as illustrated in Figure 2. The following steps
describe the telephone set authentication process:
1. The AC generates a random number (R), and it encrypts R with ACs
private key (K*AC) using the encryption algorithm (E) to obtain
signed R (S AC). which is the digital signature of the AC.
[i.e. SAc=EK*Ad R)].
2. The AC sends SAC to the telephone set over the control channel of the
digital subscriber lines and voice channel of the analog lines.
3. When the telephone set receives SAC, it decrypts SAC with AC's public
key KAC using the decryption algorithm D to recover R,
30 SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY
D .. 0"""'- RnndOI1l#
This process provides the AC the assurance that the random number
response came from the telephone. Now, the telephone set is allowed to
receive services from the network.
When the caller requests a privacy service, the AC initiates the subscriber
authentication process as illustrated in Figure 3, and The following steps
describes subscriber authentication process:
1. The subscriber requests the secure connection, and in response, the
interactive voice response (lVR) at the end office instruct the
subscriber to enter the subscriber's ID and password (lD&P) pair over
the voice channel.
2. Once the subscriber enters the ID&P, the telephone encrypts the ID&P
with AC's public key (KAC) using the encryption algorithm E to
obtain encrypted ID&P say C, [i.e. C = E KAC (ID&P)] and sends C to
the AC over the control channel of the digital subscriber lines and
voice channel of the analog lines.
Providing Voice Privacy Over Public Switched Telephone NeMorks 31
+
ID & P
0 ID & P
0--' II) & P
The AC verifies the ID&P received with the ID&P in the authentication
database. If verified to be correct, the calling subscriber is allowed to receive
the privacy service, and is denied otherwise. Once the calling subscriber is
authenticated, the AC authenticates the called subscriber using the same
process.
[;
MS,
I
Gencr.ttcd Oltt:'
MS. MS , MS.
key P\,bloc Inlle Kc-y IKE)
Pubhc key P!1\,ouc·key
t
G ... 0
+
J. 0
+ C,:E. ",IK e)
• 0 •
a) Key DlstribUllOn
K
+, +
K,.
+ ... C:E.£(M) +
E.'(:O
• I E&O
t + t t
EncrYPlcd Sig",,1
S't.:1w' Si,-:md
u) Enc,yP"o"
This key KE is only valid during the call in progress, and destroyed once
the call is terminated .. If KE is compromised during the call and the call is on
an analog subscriber line the call must be disconnected. If KE is
compromised during the call and the call is on digital subscriber line, the AC
will generate a new KE and sends to the telephone over the control channel.
Once the telephone recei ves the new key K E. it destroys the compromised key
and uses the new key. We are working on the process of compromised
encryption key, and we will describe it in our next paper.
SS7 "Ii!lI.diug
11\.\1
... ----------
... ----------
j...---------- ==========:
------ ...
----------+
SlS
REL Rbi.
l)j"ll\lUlt'\.'t
RI .c Ill.C
When S, lifts (Off-hook) the handset of the telephone, SSP, interprets off-
hook as a request for service and responds with a dial tone to Sr. Then, S,
dials the secure connection code and S2'S flumber. SSP, waits until all the
numbers have been dialed and then examines and decides to route the call to
the tandem, and to request for S,'s ID and password. Then, SSP, sends
request for S,'s 10 & password and S/s ID to the S, via interactive voice
34 SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY
response (IVR) message. While SSP I is waiting the response from SI, it
identifies an available trunk, and sends Initial Address Message (lAM) to the
tandem via SS7 network. lAM is an ISUP message and contains the
information required for the tandem to setup the requested connection. Once
SSP I receives the encrypted SI'S ID, SI'S password, and S2'S ID from SI, it
forwards it to the authentication center (AC) using an appropriate TCAP
message. The connection process continues, If and only if the AC
authenticates the S I.
When the tandem receives the lAM, it examines the lAM and determines
that it needs to forward the request to SSP2 • The tandem identifies an
available trunk, generates another lAM. and sends it to SSP 2 via the SS7
network. When SSP 2 receives the lAM, it examines the lAM. and determines
the status of S2. If S2 is busy. it sends a Release (REL) message to SSP I via
SS7 and releases the trunk for another call. REL is another rsup message.
Upon receiving the REL SSP I sends a busy signal to SI' However. if S2 is
available. SSP 2 sends Address Complete Message (ACM) to the tandem via
the SS7 network, and the tandem forwards it to SSP I. The ACM is an rsup
message, and informs SSP I that SSP 2 is ringing the S2 and the requested
trunk is reserved. SSP2 sends the ringing tone to S2 and SI through the trunk.
When S2 answers the telephone, SSP2 sends an Answer (ANM) message to
the tandem, and a TCAP message to AC via the SS7 network. The ANM is
an ISUP message that informs SSP I that S2 has answered the call. When the
tandem received the ANM. it sets up the forward path of the trunk between
the tandem and SSP2, and forwards the ANM message to SSP I. Upon the
receipt of ANM, SSP I sets up the forward path of the trunk between itself
and the tandem. Finally, SSP 2 stops sending the ringing tone to S I. The AC
sends the privacy service and ID & password request to S2 via IYR. If S2
does not accept it or responds with incorrect ID & password, then S I is given
a choice to continue as a normal connection or to terminate the connection. If
S2 responds with correct ID & password, then the AC announces the key
generation and distribution (for detail, see previous section). Once S I and S2
receive the encryption/decryption key. the secure conversation between S I
and S2 starts.
Figure 5 assumes that S2 hangs up first and then SSP2 generates and sends
a Suspend (SUS) message to the tandem. which forwards it to SSP I. When
SSP I receives the SUS message. it starts a SUS timer and waits to receive an
on-hook signal from SI. a Resume (RES) message from SSP 2, or the SUS
timer to expire. If a RES message arrives from SSP2 , the connection
continues to be active. If an on-hook signal arrives from SI or the SUS timer
expires, SSP I destroys the encryption key, sends a Release (REL) message to
the tandem via the SS7 network, and releases the trunk. Upon the receipt of
the REL message. the tandem releases the trunk, and sends a REL message to
SSP 2 via SS7 network. When the SSP2 receives the REL message, it destroys
the encryption key and sends a Release Complete (RCL) message to the SSP I
Providing Voice Privacy Over Public Switched Telephone Networks 35
through the tandem. The RCL message means that the SSP2 has released the
trunk at its end.
5 CONCLUSIONS
NOTES
This research is partly supported by NSF under grant CCR-O 113515, Center for Secure
Information Systems at GMU and Prof. S.
36 SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY
REFERENCES
I. Berman. R K. and Brewster. 1. H.. "Perspective on the AIN Architecture", IEEE
Communications Magazine, 31, No.2. February 1992.
2. Black. U., "ISDN and SST', Prentice Hall PTR, Upper Saddle River. New Jersey, 1997.
3. Bosse, 1. G. von, "Signaling IN Telecommunication Networks", John Wiley & Sons,
New York, 1998.
4. Baum, M. S. and Ford, W., "Secure Electronic Commerce". Prentice Hall PTR, Upper
Saddle River. New Jersey, 1997.
5. Carne, E. B.. "Telecommunications Primer. Second Edition", Prentice Hall PTR, Upper
Saddle River. New Jersey, 1999.
6. Chlamtac. I.. and Lin, Y .. "Wireless and Mobile Network Architectures", John Wiley &
Sons. New York, 200 I.
7. Chow. M.. "Understanding Telecommunications: Systems, Networks and Applications",
Volume I. Andan Publisher, Holmdel, New Jersey, 2000.
8. Douskalis. B.. "IP Telephony", Prentice Hall PTR, Upper Saddle River, New Jersey,
2000.
9. Gallagher, M. D. and Snyder, R A., "Wireless Telecommunications Networking with
ANSI-41", Second Edition, McGraw-Hili, New York, 2001.
10. Modan'essi, A. R. and Skoog, R. A., "Signaling System No.7: A Tutorial", IEEE
Communications Magazine, pp. 19-35. July 1990.
11. Noll. A. M., "Introduction to Telephones and Telephone Systems", Third Edition. Artech
House, Boston, 1998.
12. Rappaport, T. S .. "Wireless Communications", Prentice Hall PTR, Upper Saddle River,
New Jersey. 2002.
13. Rose. G.. "Authentication and Security in Mobile Phones",
http://people.qua!comm.com/ggr/QC/AUUG99AuthSec.pdf
14. Russell. T., "Signaling System # 7", Second Edition, McGraw-Hili, New York. 1998.
IS. Schneier, B.. "Applied Cryptography", Second Edition, John Wiley & Sons, New York,
1996.
16. Scourias, J., "Overview of the Global System for Mobile Communications",
http://ccnga.uwaterloo.ca/-jscouria/GSM/gsmrepOlt.html.
17. Stallings, W .. "ISDN: An Introduction", Macmillan Publishing Company, New York,
1989.
18. Stallings. W .. "Cryptography and Network Security", Second Edition, Prentice Hall PTR,
Upper Saddle River, New Jersey, 1999.
19. Tanenbaum, A. S., "Computer Networks" third Edition, Prentice Hall PTR, Upper Saddle
River. New Jersey. 1996.
20. Department of Defense Security Institute, "STU-III Handbook tor Industry",
http://www.tscm.com/STU ... handbook.html. February 1997.
21. ISAAC security research group, "GSM Cloning",
http://www.isaac.cs.berkeley.edulisaac!gsm-faq.html.
http://www.isaac.cs.berkeley.edulisaac/gsm.html.