Font Size: a A A

Study On The Security Of Mobile Communication

Posted on:2004-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:G C MaoFull Text:PDF
GTID:2168360092990843Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Nowadays, the communication technology is developing very quickly. Along with its popularity, mobile communication plays a more and more important role in people's social life. As people frequently use mobile communication for information exchange, how to guarantee the security of the information transmitted in the communication system and the security of the network resources has become an urgent problem.This thesis is devoted to the security of the mobile communication system. It first introduces the security characteristics and objectives of 2G mobile communication system, the mechanism used in achieving such objectives, and the existing security defects. After that, it analyzes and studies the security architecture of the 3G mobile communication system. It covers the security menaces faced by 3G, the security principles, objectives and requirements. It also analyzes the security features of 3G. Detailed discussion is focused on the authentication and key agreement used in 3G' s access network, and the mechanisms adopted for providing data encryption service and data integrity service. The algorithms and protocols used to implement the above mechanisms are introduced. An exhausting study of the standard 3G encryption algorithm-KASUMI is also made in this thesis, including its principles, components and applications. Its security is also analyzed. Finally, this thesis analyzes the requirements and feasibility of PKI in 3G system, taking both the developing trend of 3G and the cryptography skills into account. For the current security features of 3G, an issuing process of user certificate based on 3G security access mechanism AKA is put forward. Furthermore, the defect of the currently used single key mechanism in access network is discovered in this thesis. The advantages and feasibility of public-key authentication are demonstrated, based on which an authentication solution for mobile communication is brought forward.
Keywords/Search Tags:Mobile Communication Security, 3G, Public Key, Kasumi Algorithm
PDF Full Text Request
Related items