Description
CH2 is a fundamental security parameter defined within the Cordless Telephony System (CTS) specifications, specifically in 3GPP TS 43.020. It functions as a random challenge value generated by the network and transmitted to the Cordless Telephony System Mobile Station (CTS-MS) during the authentication procedure. This value is essential for implementing a secure challenge-response authentication protocol, where the mobile station must demonstrate knowledge of a shared secret key by computing a valid response based on the received challenge.
The authentication process begins when the network generates CH2 as a cryptographically secure random number. This challenge value is then sent to the CTS-MS as part of the authentication request message. Upon receiving CH2, the mobile station uses it as input to an authentication algorithm (A3) along with a shared secret key (Ki) stored in the device's Subscriber Identity Module (SIM) or equivalent secure element. The algorithm computes a signed response (SRES) which is returned to the network for verification.
The network performs the same computation independently using its copy of the shared secret key and the original CH2 value. By comparing the SRES received from the mobile station with its own computed value, the network can authenticate the device. If the values match, the mobile station is proven to possess the correct secret key and is granted access to CTS services. This mechanism prevents unauthorized access even if authentication messages are intercepted, as an attacker cannot compute the correct response without knowledge of the secret key.
CH2's randomness is crucial to the security of the system. Each authentication attempt should use a fresh, unpredictable CH2 value to prevent replay attacks where an attacker could reuse previously captured authentication exchanges. The length and quality of the random number generation directly impact the system's resistance to cryptographic attacks. Within the CTS architecture, CH2 operates alongside other security parameters like the ciphering key (Kc) and authentication algorithm configuration to provide comprehensive access security for cordless telephony services.
Purpose & Motivation
CH2 was created to address the fundamental security requirement of authenticating mobile devices in cordless telephony systems. Before standardized authentication mechanisms, early cordless phones suffered from significant security vulnerabilities including easy eavesdropping and unauthorized access through simple scanning or cloning. The CH2-based challenge-response system provided a cryptographic solution to verify that a device attempting to connect to the network is genuinely authorized to do so.
The primary problem CH2 solves is identity verification in wireless communications. By requiring the mobile station to prove knowledge of a secret key through computation on a random challenge, the system ensures that only devices with legitimate credentials can access network services. This prevents unauthorized users from making calls through the system or accessing other subscribers' services. The random nature of CH2 specifically addresses replay attacks where an attacker could record and retransmit successful authentication messages.
Historically, CH2 was introduced as part of the broader CTS security framework that evolved from earlier analog cordless systems with minimal security. The implementation of CH2-based authentication represented a significant advancement in cordless telephony security, bringing cellular-grade authentication mechanisms to residential and business cordless systems. It addressed limitations of previous approaches that relied on fixed codes or simple identifiers that could be easily intercepted and replicated by unauthorized devices.
Key Features
- Random challenge generation for authentication
- Input to A3 authentication algorithm computation
- Prevention of replay attacks through uniqueness
- Cryptographic verification of device identity
- Integration with SIM-based secret key storage
- Standardized length and format per 3GPP specifications
Evolution Across Releases
Initial introduction of CH2 within the Cordless Telephony System specifications. Defined as a random challenge value for CTS-MS authentication using the A3 algorithm with shared secret key (Ki). Established the fundamental challenge-response mechanism where the network generates CH2 and verifies the mobile station's computed response to grant access to CTS services.
Defining Specifications
| Specification | Title |
|---|---|
| TS 43.020 | 3GPP TR 43.020 |