期刊文献+

3G网络USIM卡的安全研究与实现 被引量:2

Research and Implement of Security of USIM Card in 3G Network
下载PDF
导出
摘要 通过对3G网络中USIM卡存在的安全威胁的分析,并与SIM卡安全功能进行比较,结合3G的国际标准,设计出USIM卡COS的安全管理功能模块,提出以C语言实现的针对USIM卡专用的加密算法函数库的接口API。安全功能主要从文件访问机制、鉴权算法、加密算法接口API等方面进行分析和设计。该研究成果已经成功应用到卡的芯片中,有效解决USIM卡存在的安全威胁,确保卡中储存资源的安全和通信业务的正常应用。 Through analysing the security threat of USIM Card in 3G network, comparing the security function in USIM Card with that of SIM Card, then design a security management function module by combining with 3G international standard, and brings forward C language to realize encrypt algorithm interface for USIM card. The analysis and design are mainly undertaken from document accessing management, authentication algorithm and encrypt algorithm. This design effectively solves the problem of security threat existed in USIM Card, and ensures the safety of end user's deposited resource as well as the normal use of communication operation.
出处 《现代计算机》 2008年第7期16-19,共4页 Modern Computer
基金 广州市越秀区科技计划项目 项目名称:绑定式近场通信3GCOS研制
关键词 3G通信 智能卡 卡的操作系统 鉴权算法 加解密算法 3G Communication USIM Card Operating System Authentication Algorithm Enerypt/Decrypt Algorithm
  • 相关文献

参考文献8

  • 13GPP TS 102.221 Smart cards; UICC-Terminal Interface;Physical and logical Characteristics 2007.02
  • 2IS07816-40rgarlization, Security and Commands for Interchanges, 2005
  • 3杨帆,张焕国.金融智能卡操作系统安全体系研究[J].计算机应用研究,2005,22(9):95-98. 被引量:14
  • 43GPP TS 35.206 v4.4.43G Security 7-46
  • 5马奇学.WCDMA网络的USIM卡的研究与实现[J].微机发展,2005,5:30-80.
  • 6崔宏伟.3G USIM卡的安全控制[J].山西电子技术,2006(6):45-46. 被引量:3
  • 7GPPTS 35.205 v4.0.0 3G Security; Specification of the MILENAGE Algorithm
  • 83GPPT S35.206v 4.0. 0 3G Security; Specification of the MILENAGE Algorithm: An Example Algorithm Set for the 3GPP Authentication and Key,Generation Functions fl, fl*, f2, f3, f4, fSa ndf 5*;Decument2: Algorithm Specification

二级参考文献2

  • 1[5]3GPP TS 31.102,Characteristics of the USIM Application,2002.9.
  • 2中国人民银行智能卡中心.中国金融集成电路(IC)卡规范v1.0[S].[S].,1997..

共引文献15

同被引文献15

  • 1崔宏伟.3G USIM卡的安全控制[J].山西电子技术,2006(6):45-46. 被引量:3
  • 2ETSI TS 133.102,V7.1.0,Universal Mobile Tdeoommunications System(UMTS);3G security;Security architecture[S].France:European Telecommunications Standards Institute,2006.
  • 33GPP TS 35.205,V8.0.0,3rd Generation Partnership Project;Technical Specification Group Services and System As-peers;3G Security;Specification of the MILENAGE Algorithm Set:An example algorithm set for the 3GPP authentication and key generation functions f1,f1*,f2,f3,f4,f5 and f5*;Document l:General[S].France:the 3rd Generation Partnership Project,2008.
  • 4ETSI TS 102.221,V7.8.0,Smart Cards;UICC-Terminal interface;Physical and logical characteristics[S].France:European Tdeoommtmications Standards Institute,2007.
  • 53GPP TS 35.208,V8.0.0.3rd Generation Partnership Project;Technical Specification Group Setvices and System Aspeets;3G Security;Specification of the MILENAGE Algorithm Set:An examplealgorithm set for the 3GPP authentication and key generation functions f1,f1*,f2,f3,f4,f5 andf5*;()Document 4:Design Con-formanoe Test Data[S].Frame:the 3rd Generation PartnershipProject,2008.
  • 6中国移动通信企业标准.USIM卡技术规范[S].北京:中国移动通信集团公司,2008.
  • 7Witzke E.L.,Pierson L.G.Key Management for Large Scale End-To-End Encryption.Security Technology[C].Proceedings.Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference on12-14 OCT.1994:76-79.
  • 8Lu Wenpai,Sundareshan M.K.Secure Communication in Internet Environments:A Hierarchical key Management Scheme for End-To-End Encryption[J].IEEE Transaction On Communications,198937(10):1014-1023.
  • 9Holub J.,Street M.D.Impact of end to end encryption on GSM speech transmission quality a case study[J].Secure Mobile Communications Forum:Exploring the Technical Challenges in Secure GSM and WLAN,2004.The 2nd IEE 239.2004:6/1-6/4.
  • 10宋述燕,王锦程.基于蓝牙技术的Linux系统和手机终端通讯实现[J].中南民族大学学报(自然科学版),2007,26(4):54-57. 被引量:1

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部