期刊文献+

基于鉴权矢量相似度分析的GSM鉴权改进算法

A New GSM Authentication Algorithm Based on Auth-Vector Comparability
下载PDF
导出
摘要 现有GSM无线通信系统中应用最为广泛的是COMP128-1算法,其安全漏洞最早是由伯克利大学的一个研究小组公布的。本文主要分析了现有的针对COMP128-1算法漏洞的一些攻击及防护手段,提出了基于相邻鉴权矢量的相似度分析的新的安全防护手段,以有效识别对COMP128-1漏洞的攻击鉴权行为,从而有效抵抗这些攻击手段,保护KI不被破解。 COMP128-1 is the most widely-used algorithm in the GSM telecom system, but the leak in it has been found by a R&D team of Berkeley University at 1998. This paper analyzes the attacks to the leak and presents a new security method which detects the comparability among those authentication random vectors. The method can distinguish effectively almost all the attacks to protect KI.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第3期35-37,158,共4页 Computer Engineering & Science
关键词 COMP128 strong—KI 相似度 COMP128 st rong-KI comparability
  • 相关文献

参考文献6

  • 1GSM Cloning[EB/OL]. [2008-10-15]. http://www, isaac. cs. berkeley, edu/isaac/gsm-faq, html.
  • 2汪涛,杨义先,孙勇.COMP128算法分析中关键问题研究[J].计算机工程,2007,33(1):22-24. 被引量:1
  • 3A3A8[EB/OL]. [2008-10-15]. http://www, gsm-security. net/papers/a3a8, shtm.
  • 4ETSI TS 100 977. Digital Cellular Telecommunications System (Phase 2+). Specification of the Subscriber Identity Module-Mobile Equipment (SIM-ME) Interface[S]. ETSI GSM 11.11 Version 8. 3.0 Release,1999.
  • 5Rao J R, Rohatgi P, Seherzer H, et al. Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards[C]//Proc of IEEE Syrup on Security and Privacy,2002:31-34.
  • 6唐剑峰,吕志虎.增强型安全SIM卡技术方案[J].电信科学,2004,20(12):25-27. 被引量:3

二级参考文献5

  • 1A3A8[Z].http://www.gsm-security.net/papers/a3a8.shtml.
  • 2SimScan[Z].http://users.net.yu/~dejan/.
  • 3Skiena S S.The Algorithm Design Manual[M].Springer-Verlag,1997.
  • 4Bellman R E.Dynamic Programming[M].Princeton University Press,1957.
  • 5Lee Liequan,Siek J G.Andrew Lumsdain[M].Boost Graph Library,2000.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部