Font Size: a A A

The Research And Design Of 3G Security Algorithm

Posted on:2012-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:D WangFull Text:PDF
GTID:2218330338955121Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
3G is a network system which coverage and use of in worldwide, information transmission either through the full opening of the wireless link, has also been open global cable network. Meanwhile,3G in addition to traditional voice business, it also provides multimedia services, data services, and e-commerce, internet services and other information services. Therefore, to ensure the security of 3G business information and the network resource use has become an urgent problem to be solved.Based on the 3G system security architecture analysis, for 3G system face security threats, research on both aspect of theoretical and practical development, design kernel algorithm which based on advanced encryption algorithm, provide the services for the 3G system data confidentiality and integrity; research on various security measures and safety algorithm which defined by 3GPP, give the design proposal of the 3G system authentication and key agreement mechanism, improve the system's security service mechanism; Aim at the design of kernel algorithm and specification requirements of 3GPP, design the framework of data confidentiality algorithm f8 and data integrity algorithm f9, achieve the security service of 3G system.In this thesis, analyze the security and random of the kernel algorithm. On the security aspect, this article research on the existing major attack, analysis kernel algorithm exhaustive attacks, differential attacks and linear attacks, to meet the requirements of linear security and differential security of the kernel algorithm; In random testing, through frequency test, serial test, poker test, run test and autocorrelation test, random test for kernel algorithm, the results meet the 3GPP requirements for random algorithm kernel.
Keywords/Search Tags:3G, confidentiality algorithm, integrity algorithm, authentication and key agreement
PDF Full Text Request
Related items