TETRA Security
The AC is normally not stored in the handset.
In the Network (Authentication Centre) either
the K or the AC is stored. In the latter case the
K is derived form the AC every time this is
needed. This method is used if it is needed to
identify the user of a handset, but not the
handset. It should be noted that the AC would
normally have much less then 128 information
bits. Therefore, this method for generation of
K should only be used in exceptional cases,
e.g. if there is a need for user authentication
only or if a key needs to be generated
immediately and there is no possibility to use
an UAK (see below).
to MSs using so-called Over The Air Re-
keying (OTAR, see also Air interface
authentication and key management
algorithms) or they may be preloaded in the
MSs. There are both keys with long-term and
short-term key lifetimes. Special mechanisms
are included to protect the keys with a long
lifetime. For the interested reader a
description of the keys for encryption within
the TETRA system is provided below.
The Derived Cipher Key (DCK) is derived
during the authentication procedure. It can be
used to encrypt the link between the network
and the MS on an individual basis. Thus it can
also provide an extended implicit authentication
during the call, and can e.g. be used for
encryption of uplink communications (i.e. the
communication from the network to the MS).
Method 2 — Generation of K from an User
Authentication Key (UAK). The User
Authentication Key is an unpredictable
(random) value of any desirable length
(usually 128 bits). The K is derived from the
UAK using an algorithm. The UAK or
(normally) the K is stored in the handset (or
SIM) and the network (Authentication
Centre). If the UAK is stored then every time
the K has to be derived from it. This method is
used if it is needed to identify the handset. It
will be the most common method of key
generation in TETRA systems.
The Common Cipher Key (CCK) is generated
by the SwMI and distributed, encrypted with
the DCK, to MSs. It is efficient to use this key
for encryption of messages that are directed to
a certain Location Area (LA)7. In practice the
CCK can be used to set up a group call with all
MSs that at the moment are in a certain area,
independent of the specific closed user groups
these MSs are part of.
Method 3 — Generation of K from an
Authentication Code (AC) and an User
Authentication Key (UAK). In this case the K
is derived from an AC entered by the user via
the keyboard of the handset and a UAK stored
in the handset. The derivation of K from AC
and UAK is done via an algorithm. In the
network either only the resulting K is stored,
or both the AC and UAK are stored. This
method is used if it is needed to identify both
the user and the handset.
When the CCK is distributed to an MS over
the air interface using OTAR it is encrypted
with the DCK of this MS.
The Group Cipher Key (GCK) is linked to a
specific closed user group. It is generated by the
SwMI and distributed to the MSs of a group
(e.g. similarly to the CCK, on a smart card, or
using OTAR (see below)). It is used either in its
‘raw’ state or modified by the CCK, for
encryption of calls for this user group.
Keys for air interface encryption
7
A Location Area is a geographical area where a
network and a number of MSs are operational which
have certain logical connections (e.g. Public Safety
organizations of a city, a department, etc.).
There are several sorts of encryption keys. The
key may be derived or transferred as part of
the authentication procedure, then can be sent
50
Information Security Technical Report, Vol. 5, No. 3