Description
The SMG Security Group (SMG-SG) was a crucial working entity within the ETSI Special Mobile Group (SMG) organizational structure. Its exclusive mandate was to address all security-related matters for the GSM system. The group operated with a high degree of confidentiality due to the sensitive nature of cryptographic design. The SMG-SG's primary technical output was the specification of the GSM security architecture and its core cryptographic algorithms. This involved several key components. First, it defined the authentication and key agreement (AKA) mechanism. This used the A3 algorithm (for authentication) and the A8 algorithm (for cipher key generation), which were implemented on the Subscriber Identity Module (SIM) and in the Authentication Center (AuC) of the network. The shared secret key (Ki) stored on the SIM and AuC was the foundation of this process. Second, the group specified the A5 family of stream ciphers (e.g., A5/1, A5/2, A5/3) used to encrypt voice and data traffic over the radio interface between the mobile station and the Base Transceiver Station (BTS). The design and evaluation of these algorithms were conducted by security experts from member organizations, often in closed sessions. The SMG-SG also worked on security protocols for signaling and the overall security objectives for the network, such as subscriber identity confidentiality (using Temporary Mobile Subscriber Identity - TMSI) and network authentication of the subscriber. Its work ensured that GSM, as the first digital mass-market cellular system, incorporated robust security features that were a significant advancement over the vulnerable analog systems it replaced.
Purpose & Motivation
The creation of the SMG-SG was driven by the fundamental need to secure the new digital GSM network against a range of threats that were either impossible or difficult to address in analog systems. Analog cellular signals were easily intercepted, allowing for eavesdropping and cloning of subscriber identities. The GSM project recognized that for the system to gain user trust and operator adoption, especially for business use, strong security was non-negotiable. The SMG-SG was formed to solve these specific problems: to prevent unauthorized network access (through strong mutual authentication), to protect user privacy by encrypting voice calls and data on the radio path, and to secure subscriber identity. It addressed the limitations of previous approaches by moving from security-through-obscurity (as was common in proprietary analog systems) to a standardized, algorithm-based security model. The group's work was also influenced by export controls on cryptography (like those from the Wassenaar Arrangement), leading to the creation of multiple versions of the A5 cipher with differing strengths. The purpose was to design a security system that was sufficiently strong for its time, implementable on the limited hardware of early SIM cards and phones, and acceptable to regulators across different countries.
Key Features
- Dedicated body for GSM security standardization within ETSI SMG
- Specified the GSM Authentication and Key Agreement (AKA) protocol using A3/A8 algorithms
- Designed the A5 family of stream ciphers for over-the-air encryption (A5/1, A5/2, A5/3)
- Managed the confidential specifications for cryptographic algorithms
- Defined security architecture objectives: confidentiality, authentication, and identity protection
- Addressed regulatory and export control constraints in cipher design
Evolution Across Releases
The SMG-SG was active during the development of core GSM standards. It established the foundational GSM security architecture, specifying the initial A3/A8 algorithms (often implemented as COMP128) and the A5/1 cipher for strong encryption in most markets and A5/2 for export versions. Its work was integral to the initial GSM Phase 2 specifications.
As cryptographic attacks on the initial algorithms (like COMP128) were identified in the public domain, the SMG-SG responded by specifying enhanced algorithms. This included work on the more robust MILENAGE algorithm set (based on the AES block cipher) for 3G/UMTS, and the development of the stronger A5/3 cipher (based on the KASUMI block cipher) as a replacement for A5/1. This period involved transitioning security work towards 3GPP.
Defining Specifications
| Specification | Title |
|---|---|
| TS 41.033 | 3GPP TR 41.033 |