期刊文献+

GSM网络环境认证协议的研究

Identity Authentication Protocol in GSM Network Environment
下载PDF
导出
摘要 针对现有的对GSM的攻击,提出一种应用AES算法在GSM中进行身份认证和密钥协商的方案。该方案易于实现,仅使用AES算法,不需要对GSM现有的数据库进行变动,认证流程也与正在使用的GSM认证流程相似。此外,该方案还有保密性高,计算复杂度低,传输参数少的优点。文章最后给出了协议的安全性分析和实现效率的分析。 In this paper we present a new Identity Authentication Protocol in GSM Network Environment with arithmetic AES to prevent the attacks on GSM network. This protocol is easy to carry out.It uses arithmetic AES only and need not change the database of GSM at all. The process of Identity Authentication is just similar to the process of GSM. The advantages of this protocol are higher security, low computational complexity and fewer parameters of transmission. The security and the efficiency analysis are given at the end of this paper.
出处 《信息工程大学学报》 2005年第2期23-26,共4页 Journal of Information Engineering University
基金 国家863计划资助项目(2003AA1Z1270)
关键词 GSM 身份认证 AES算法 GSM Identity Authentication AES
  • 相关文献

参考文献5

二级参考文献12

  • 1林德敬,林柏钢,林德清.3G系统全网安全体制的探讨与分析[J].中兴通讯技术,2003,9(2):41-45. 被引量:3
  • 2[1]Lo Chi-Chun, Chen Yu-Jen. A secure communication architecture for GSM networks[A]. Proc IEEE PACRIM′99[C].Victoria,1999.
  • 3[2]Lo Chi-Chun, Chen Yu-Jen. Secure communication mechanisms for GSM networks[J]. IEEE Trans on Consumer Electronics,1999, 45(4):1074-1080.
  • 4[3]Lo Chi-Chun, Chen Yu-Jen. Stream ciphers for GSM networks[J]. Computer Communications,2001,24(11):1090-1096.
  • 5[6]Microprocessor ,Microcomputer Standards Committee of the IEEE Computer Society. IEEE Standard Specifications for Public Key Cryptography[DB/OL]. http://intl. ieeexplore.ieee. org. 2002-01-30.
  • 6[7]Sarbari Guta, Stephen M, Matyas J. Public key infrastructure analysis of existing and needed protocols and object formats for key recovery[J]. Computers and Security,2000,19:56268.
  • 7[8]Park C-S. On certificate-based security protocols for wireless mobile communication systems[A]. IEEE Network[C].1997.50-55.
  • 8[9]Beller M J, Chang L-F, Yacobi J. Privacy and authentication on a portable communications systems[J]. IEEE J on Selected Areas in Communications,1993,11(6):821-829.
  • 9姚惠明,隋爱芬,杨义先.3GPP网络AKA协议中若干算法的设计[J].北京邮电大学学报,2002,25(3):98-102. 被引量:8
  • 10林德敬,林柏钢,陈自力.数字蜂窝移动通信系统安全技术的探讨与分析[J].电信建设,2002(5):70-74. 被引量:7

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部