Font Size: a A A

Research And Implementation On Encrption Of UMTS System

Posted on:2012-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:F L HeFull Text:PDF
GTID:2218330371452347Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In the third generation mobile communication system(UMTS),it is very importantcharacteristics to provide good confidentiality is very important characteristics of UMTSthrough transmission encryption to provide security measures The encryption can be used forvoice,data and signaling,and data type independent,restricted to conventional burst Theencryption done by a Poisson random sequence and conventional burst into 114 bits ofinformation It obtained by the XOR operation At the receiving end to produce the samePoisson random sequence,and the received encryption sequence XOR operation can get therequired dataEncryption mode processing subsystem in AU protocol system,responsible for the userin the air transmitting user data(including voice and data)and signaling data encryption,toprotect traffic and signaling channel information of a user'S privacy It uses the encryptionkey Kc,using A5 algorithm to simultaneously at the base station and the mobile phoneencryption and decryption Encryption refers to encryption on a wireless channel,in order toprevent the AU and MS exchange between user information and user parameters have beenillegally individuals or groups monRoring or stealThis paper first gives a brief introduction to analysis of UMTS system networkarchitecture and cryptography related content,and then described in detail UMTS severalmain safety function(user authentication,encryption and user authentication wireless pathprotection)implementation mechanism,finally the authentication scheme,A5 algorithm andencryption key length,has made the further analysis. On this basis,focusing on the UMTSencryption mode treatment module signaling process and strategy and optimization,throughto these signaling the implementation and optimization of UMTS system,improve the validityofthe encryption...
Keywords/Search Tags:encryption algorithm, BSSAP ciphering mode command message, RR ciphermode complete message
PDF Full Text Request
Related items