Font Size: a A A

Research On The Application Of Authentication And Key Agreement Protocol In 3G

Posted on:2006-07-13Degree:MasterType:Thesis
Country:ChinaCandidate:F LiuFull Text:PDF
GTID:2168360155472900Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Third-generation (3G) mobile communication system is a global network system. It supports not only the tradional voice and data services, but also interoperable and distributing services such as high quality multimedia services, electronic commerce etc. The new service environment demands higher security of network.This thesis is devoted to the study of Authentication and Key Agreement mechanism of 3G mobile communication system, which includes protocols, algorithms and implementation etc. The thesis starts with the introduction of the 3G security architecture, characteristics and aims, and the security mechanism of network access is elaborated at the same time. Then, the procedure and implementation of AKA protocol are discussed. After that, based on the analysis of the security algorithms involved in AKA protocol, a new designing method is proposed and tested. Finally, the conclusions and the key points of the future work are presented.The main contributions of the thesis are as follows:(1) ASN.1 is a kind of tag language, which depicts structural infomation. As an international standard, it is applied to standardize data types and values. ASN.l can also be employed to describe the third layer (application layer) message in the 3GPP message system (including the security protocol). With the security protocol described by ASN.l, security algorithms and ASN.l encoder/decoder are implemented through VC++. The method of description and implementation of the protocol in this thesis can be widely applied in the research and test of other communication protocols.(2) Chaotic sequences are pseudo random, unpredictable and sensitive to initial condition and parameters, which are suitable for cryptography application. With Logistic mapping, a new hash function is designed and the test results show it has good confusion and diffusion properties.(3) Considering the standardization is not necessary, the security algorithms involved in AKA protocol can be developed to enrich the choices of carriers and developers. In this thesis, the solution of AKA algorithms, which uses hash function as core algorithm, is proposed. It's easy to be implemented and has the good prospect for application.
Keywords/Search Tags:3G, Authentication and Key Agreement, ASN.1, Chaotic mapping, Hash function
PDF Full Text Request
Related items