B2

CTS Authentication Key Generation Algorithm

Security
Introduced in Rel-8
B2 is a cryptographic algorithm used in 3GPP systems to generate authentication keys for Cordless Telephony System (CTS) security. It provides the foundation for secure authentication between CTS mobile stations and the network, ensuring subscriber identity protection and preventing unauthorized access. This algorithm is essential for maintaining the integrity of CTS authentication procedures.

Description

The B2 algorithm is a standardized cryptographic function specified in 3GPP TS 43.020 that generates authentication keys for Cordless Telephony System (CTS) security mechanisms. As part of the CTS authentication and key agreement (AKA) protocol, B2 operates within the authentication center (AuC) of the network and within the CTS mobile station's security module. The algorithm takes specific input parameters including the subscriber's secret key (Ki), a random challenge (RAND), and other authentication-related data to produce a unique authentication key (Kc) for each authentication session.

Architecturally, B2 functions within the CTS security framework that includes multiple cryptographic algorithms (B1, B2, B3, B4) each serving distinct purposes in the authentication and encryption chain. B2 specifically handles the generation of the ciphering key Kc, which is then used by other algorithms for actual encryption of user data and signaling. The algorithm implementation must ensure that even with knowledge of multiple RAND-Kc pairs, an attacker cannot feasibly derive the secret Ki, maintaining the long-term security of the authentication system.

Technically, B2 is designed as a one-way function that produces a fixed-length output key from variable-length inputs. The algorithm employs cryptographic primitives including permutation operations, substitution tables, and logical operations to achieve the required cryptographic strength. During authentication, the network generates a random RAND and computes the expected response (SRES) and cipher key (Kc) using B2 along with other algorithms. The mobile station independently computes the same values, enabling mutual authentication when the computed values match.

The B2 algorithm's role extends beyond mere key generation—it forms part of a comprehensive security chain where each algorithm (B1-B4) has specialized functions. B2's output (Kc) serves as input to subsequent algorithms that handle actual encryption, ensuring separation of concerns in the cryptographic design. This modular approach allows for potential algorithm updates while maintaining backward compatibility with existing authentication infrastructure.

Purpose & Motivation

The B2 algorithm was created to address the specific security requirements of Cordless Telephony System (CTS) within GSM/3GPP networks. CTS required robust authentication mechanisms to prevent unauthorized access to telephony services while maintaining compatibility with existing GSM security architectures. Before standardized algorithms like B2, proprietary solutions created interoperability challenges and potential security vulnerabilities across different network equipment vendors.

Historically, the development of B2 responded to the need for a standardized, cryptographically sound method to generate session keys for CTS authentication. The algorithm needed to balance computational efficiency for implementation in resource-constrained mobile devices with sufficient cryptographic strength to resist known attacks. By providing a standardized approach to key generation, B2 enabled consistent security implementation across different network operators and equipment manufacturers, facilitating global interoperability of CTS services.

The creation of B2 addressed limitations in earlier authentication approaches that either lacked proper key separation or used weaker cryptographic constructions. By specializing in authentication key generation as part of a larger algorithm suite (B1-B4), B2 allowed for optimized security where each algorithm could be specifically designed and potentially updated independently. This modular design philosophy supported the evolution of CTS security while maintaining the fundamental authentication framework established in earlier GSM specifications.

Key Features

  • Generates 64-bit cipher key (Kc) for CTS sessions
  • Uses subscriber-specific secret key (Ki) and random challenge (RAND) as inputs
  • Implements one-way cryptographic function to prevent key derivation
  • Part of standardized algorithm suite (B1-B4) for complete CTS security
  • Designed for efficient implementation in both network and mobile equipment
  • Provides foundation for mutual authentication between CTS devices and network

Evolution Across Releases

Rel-8 Initial

Initially specified as part of CTS authentication in 3GPP TS 43.020. The algorithm was designed to generate authentication keys for Cordless Telephony System security, providing standardized cryptographic functions for key generation. B2 was introduced alongside other CTS security algorithms (B1, B3, B4) to form a complete authentication and encryption framework.

Defining Specifications

SpecificationTitle
TS 43.020 3GPP TR 43.020