期刊文献+

一种基于空中接口和核心网协同的LTE系统密钥推演方法 被引量:1

Cooperative method of key derivation for LTE systems based on radio interface and core network
下载PDF
导出
摘要 从窃听方的角度,基于空中接口与核心网协同的思想提出了一种LTE系统密钥推演方法。首先,在实现根密钥同步的基础上,根据空中未加密信息提供的安全算法列表,遍历有限安全算法集;然后,将遍历的安全算法与获取的父密钥共同作为参数,通过密钥生成函数生成空中接口子密钥;最后,通过比对明文和解密密文确定密钥。可行性分析表明,窃听方可以利用该方法推演出空中接口子密钥;误码率小于10-3时,可使密钥推演成功率达到90%以上,具有实际应用意义。 This paper put forward a cooperating method for key derivation based on the idea of combination of radio interface and core network. It produced the radio child-keys according to the security algorithm list provided by plain radio message and obtained parent-key, and decided the fight key by comparing the plain context and the deerypted context. It proves that the correct rate of key derivation is more than 90% in the case that the symbol error rate (SER) is less than 10-3 according to the analysis of feasibility. Therefore it has practical application values.
出处 《计算机应用研究》 CSCD 北大核心 2013年第9期2755-2758,2771,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61171108)
关键词 长期演进 安全算法 密钥推演 误码率 long time evolution(LTE) security algorithm key derivation SER
  • 相关文献

参考文献11

  • 13GPP TS 33. 401 vl 1.1.0, 3rd generation partnership project; tech- nical specification group services and system aspects; 3GPP system architecture evolution ( SAE ) security architecture [ S ]. Valbonne : 3GPP,2012.
  • 2HAN C K. Security analysis and enhancements in LTE-advanced net- works [D]. Seoul:Sungkyunkwan University, 2012.
  • 3GINS E A, RAPHAEL C W, PARISH D J. Analysis and design of se- curity for next generation 4G cellular networks[ C ]//Proc of the 13th Annual Post Graduate Symposium on the Convergence of Telecommu- nications, Networking and Broadcasting. 2012.
  • 4FORSBERG D, HUANG Le-ping, TSUYOSHI K, et al. Enhancing security and privacy in 3GPP E-UTRAN radio interface[ C]//Proc of Personal, Indoor and Mobile Radio Communications. 2007 : 1 - 5.
  • 5MJ I.SNES S, TSAY J K. Computational security analysis of the UMTS and LTE authentication and key agreement protocols [ EB/ OL]. ( 2012- 03- 17 ) [ 2013- 01- 08 ]. http ://arxiv. org/abs/1203.
  • 6FUHR T, GILBERT H, REINHARD J R,et al. Analysis of the initial and modified versions of the candidate 3GPP integrity algorithm t28- EIA3 [ C ]//Proc of the 18th Internatianal Workshop on Selected Are- as in Cryptography. 2011:230-242.
  • 73GPP TS 33. 102 vll. 5.0, 3rd generation partnership project; tech- nical specification group services and system aspects ; 3G secu-rity; security architecture [ S ].
  • 8Valbonne :3 GPP,2012. 3GPP TS 24. 301 vll. 4.1,3rd generation partnership project; tech- nical specification group core network and terminals; Non-access-stra- tum (NAS) protocol for evolved packet system (EPS) [ S ].
  • 9Val- bonne : 3 GPP, 2012. ORHANOU G, HAJJI S E, BENTALEB Y. SNOW 3G stream cipher operation and complexity study [ J]. Contemporary Engineering Sciences,2010,3 ( 3 ) :97-111.
  • 10TUNSTALL M. Practical complexity differential Cryptanalysis and fault analysis of AES [ J ]. Journal of Cryptographic Engineering, 2011,1 (3) :219-230.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部