Font Size: a A A

Analysis And Simulation Of Third Generation Mobile Communication System, Encryption And Authentication Algorithm

Posted on:2003-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:S T MaFull Text:PDF
GTID:2208360065451060Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The information security as one of the primary considering aspects in the Third Generation Mobile Communication System (3G), in which encryption algorithm f8 and integrity algorithm f9 are the main standard security algorithms, takes into special account.In this paper, the general structure of block cipher together with its related properties is firstly discussed, then the main non-linear component of S-boxes in block cipher is analyzed.As to the Boolean Function in binary field, We studied its Non-linearity, Linearity Structure, Output Bit Independence Criterion (BIG), Balance, Completeness, Strict Avalanche Criterion, Propagation Criterion, Correlation Immunity, Linear Approximation Table and XOR Distribution Table .We also discussed the Pile-up Lama used to compute the combination linear probability and showed an instance of its application. The differential probability and linear probability is defined and the approximation expression to compute the maximum differential and linear probability of while SPN's from the single round's differential and linear probability is presented. As far as KASUMI algorithm is concerned, we get the maximum probability of differential and linear through computing the S7 box and S9 box's differential and linear probability. Thus, we prove it is secure against differential and linear cryptanalysis.In the end, quick implementation of KASUMI, f8 and f9 are simulated under the condition of Windows 98 with Celeron 633 and 128M memory, the simulation data show that the f8 algorithm is capable of achieving the encryption rate up to 1.9Mbit/s, while f9 algorithm only takes 20ms to compute the MAC with the length of 5114 bits, both of which can reach the basica requirement of 3G.
Keywords/Search Tags:KASUMI, differential cryptanalysis, linear cryptanalysis
PDF Full Text Request
Related items