期刊文献+

基于公钥算法改进型AKA协议安全性分析 被引量:1

Security Analysis of the Improved AKA Protocol based on Public-key Algorithm
原文传递
导出
摘要 3G系统安全框架采用了3GPP组织建议的AKA协议机制,并对无线链路上传输的数据进行加密保护,对传送的信令消息进行完整性保护。比2G系统在无线空中接口的安全性上有了很大的提升。但是,自从AKA协议提出后,国外许多学者就对该协议进行了研究,提出了该协议存在的许多安全问题,同时给出了许多改进AKA的建议。采用一种协议元素机密性推导方法分析了3GPP AKA和改进型AKA的安全性,提出了改进型AKA存在的安全薄弱点,并提出了改进协议的方法。 3G-system security framework, with AKA protocol mechanisms suggested by 3GPP organization, implements crypto protection of transmission data on wireless link ,including integrity protection of the sig- naling messages. Compared with 2G system, 3G system receives great improvement in the security of wire- less air interface. However, since the proposal of AKA protocol, many foreign scholars have carried out detailed study on the protocol, and found a lot of security problems, and proposed some suggestions for im- provement. In this article, the authors , with a protocol-element confidentiality derivation method, analyze the security of 3 GPP AKA protocol and the improved AKA protocol, then point out the vulnerability exist- ing in the improved AKA insecurity, and also proposes the method for improvement.
出处 《通信技术》 2013年第11期95-98,共4页 Communications Technology
关键词 3GPP AKA 认证 密钥协商 3 GPP AKA authentication key agreement
  • 相关文献

参考文献6

  • 1施志勇,刘治生,胡中豫,马大玮.TD-SCDMA通信网络安全中的AKA机制研究[J].通信技术,2008,41(4):62-64. 被引量:2
  • 2陆峰,郑康锋,钮心忻,杨义先,李忠献.3GPP认证与密钥协商协议安全性分析[J].软件学报,2010,21(7):1768-1782. 被引量:17
  • 3HU Xin, ZHENG Qiang. AccessSecurity Mechanism in TD-SCDMA System[ EB/OL]. Chinese Scientific Papers Online. (2007-09-01) [2013-05- 11 ] http://www. paper, edu. cn.
  • 4刘宪国,薛红喜.一种改进的高效鲁棒的3GPP AKA协议[J].通信技术,2011,44(2):87-90. 被引量:3
  • 5SARAIREH JA, YOUSEF S. Analyses Authentication and Key Agreement Protocol for UMTS Mobile Networks [ C]//Proc. of the 1st Int'l Conf. on Mobile Computing and Wireless Communication. Washington: IEEE Com- puter Society Press, 2006:27-31.
  • 6SARAIREH JA, YOUSEF S. Extension of Authentication and Key Agreement Protocol (AKA) for Universal Mobile Telecommunication System (UMTS) [ J ]. Int' 1 Journal of Theoretical and Applied Computer Sciences, 2006, 1(01) :109-118.

二级参考文献15

  • 1袁亚飞,廉玉忠.3G认证与密钥分发协议逻辑化分析[J].信息工程大学学报,2004,5(4):15-17. 被引量:5
  • 2蒋睿,李建华,潘理.基于串空间模型的3GPP认证密钥交换协议分析[J].上海交通大学学报,2006,40(5):791-795. 被引量:5
  • 3刘峰,李大兴.3G认证与密钥分配协议的改进[J].计算机工程与设计,2006,27(14):2705-2707. 被引量:3
  • 43GPP TS33. 102 version 5.0. 022002, 3G Security: Security Architecture (Release 5) [S].
  • 53GPP Pecifications,33.102-2008.Technical specification Group Services and System Aspects:3G Security;Security Archi tecture[S].[s.1.]:3GPP,2008.
  • 63GPP Pecifications,33.105-2007.Technical Specification Group Services and System Aspects;3G Security;Cryptographic Algorithm Requirements[s].[s.1.]:3GPP,2007.
  • 7ZHANG M X,FANG Y G.Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol[J].IEEE Trans.Wireless Commun.,2005,4(02):734-742.
  • 8JUANG W S,WU J L.Efficient 3GPP Authentication and Key Agreement With Robust User Privacy Protection[C].USA:IEEE,2007:2722-2727.
  • 9陈自力 林德敬 林柏钢.第二、三代移动通信系统安全体系的分析与比较.通信技术,2003,6:97-100.
  • 10施志勇,刘治生,胡中豫,马大玮.TD-SCDMA通信网络安全中的AKA机制研究[J].通信技术,2008,41(4):62-64. 被引量:2

共引文献18

同被引文献8

  • 1Canetti R, Halevi S, Katz J. A Forward-Secure Public- Key Encryption Scheme[C]. In: Biham E, ed. Proc. of the Eurocrypt 2003. LNCS 2656, Berlin: Springer-Ver- lag, 2003. 255-271.
  • 2Dodis Y, Katz J, XU S, et al. Key-Insulated Public- Key Cryptosystems [ C ]. In: Knudsen LR, ed. Proc. of the Eurocrypt 2002. LNCS 2332, Berlin: Springer-Ver- lag, 2002. 65-82.
  • 3WENG J, LI X X, CHEN K F, et al. Identity-based Parallel Key-Insulated Encryption Without Random Ora- cles : Security Notions and Construction [ C ]. In : Barua R, Lange T, eds. Proc. of the Indocrypt 2006. LNCS 4329, Berlin : Springer-Verlag, 2006. 1143-1157.
  • 4Itkis G, Reyzin L. SiBIR:Signer-Base Intrusion- resili- ent Signatures [ C ]. In: Yung M, ed. Proc. of the CRYPTO 2002. LNCS 2442, Berlin: Springer- Verlag, 2002. 499-514. [doi: 10. 1007/3-540-45708-9_32].
  • 5YU J, KONG FY, CHENG X G,et al. Intrusion-Resili- ent Identity- based Signature: Security Definition and Construction[ J]. Journal of Systems and Software, 2012, 85(2) :382-391.
  • 6DODIS Y, FRANKLIN M, KATZ J, et al. Intrusion Re- silient Public - key Encryption [ C ]. In: Joye M, ed. Proc. of the CT-RSA 2003. LNCS 2612, Berlin: Spring- er-Verlag, 2003. 19-32.
  • 7Waters B. Efficient Identity-based Encryption Without Random Oracles [ C ]. In : Cramer R, ed. Proc. of the Eurocrypt 2005. LNCS 3494, Berlin: Springer-Verlag, 2005. 114-127.
  • 8于佳,程相国,李发根,潘振宽,孔凡玉,郝蓉.标准模型下可证明安全的入侵容忍公钥加密方案[J].软件学报,2013,24(2):266-278. 被引量:13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部