Font Size: a A A

The Research Of Network Security Identity Authentication Algorithm In The 4g System

Posted on:2009-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:L N ZhengFull Text:PDF
GTID:2198360308478746Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the continuous combinations of wireless networks and Internet, the mobile communication system has experienced the development of 1G (the first generation),2G (the second generation) and 3G (the third generation), and gradually evolved towards the whole-IP general line communication system in 4G (the fourth generation) everywhere. Due to the reason that the 4G system seamlessly integrates of different wireless communications and supports the high-speed communication environment, security problems of 4G are more complicated and difficult to resolve than the former wireless communication systems. Therefore, all countries in the world are promoting the commercialization of 3G mobile communications systems, and at the same time, they have shifted the research emphasis on the preliminary study of the 4G system. Comparing at all technologies related with wireless network securities, which are from the access security of traditional wireless LANs to 802.1 X, from GSM to the security development direction of the future 4G system, the identity authentication technology is the first defense line of the whole security system and what kind of Algorithm applied in the system is the most important problem in authentication technology. For more than a wireless network coexistence, and the complex structure of 4G system, the realization of how efficiently between different network entities as the mutual authentication, is a very complex issue for the 4G system with complicated structure and various kinds of wireless network coexistences, it is quite a complicated problem to realize the co-identity authentications among different network entities effectively. However, the existed wireless network security systems are not considered deeply and comprehensively on the above problems, and are insufficient on the comprehensive considerations of the efficiency, compatibility, expansibility and user-resolvability.This paper starts from the authentication system algorithm system and researches the identity authentication algorithm researching project of the mobile communication in 4G.In Chapter 1, this thesis first analyzes the researching and developing status of the 4G system in the home and abroad, and then in Chapter 2 analyzes the affinity of the wireless network and the authentication algorithm. According to the security designing principles of the 4G system, the paper concludes the security threats and needs that the 4G system are facing. On the other hand, the paper also detailed describes several common authentication mechanisms with the detailed analyses and contrasts of the existed identification authentication key cryptographies. On the basis of this, in Chapter 3with the combination of the ellipse curving password mechanism and the self-validated identity authentication key cryptography, the self-validated identity authentication project based on the GF (2m) field ellipse curve is set up in the paper. In the last Chapter, a conclusion for the whole thesis is set up.
Keywords/Search Tags:4G System, Identity Authentication, Elliptic curve
PDF Full Text Request
Related items