Font Size: a A A

The Research Of Conifdentiality Of End-to-end Based On Mobile Network

Posted on:2013-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:X B MaFull Text:PDF
GTID:2218330374465817Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer and communicatin technology,2G and3G have a rapid developing.3G has put forward specific security measures, from the authentication algorithm, the key agreement protocol to encryption algorithm. Due to the opening characteristic of the mobile network, the mobile network can't meet the people's requirement of security. The existing mobile network has mainly realized the user access network security, but it did not reach the end-to-end security. Therefore, the research confidentiality of end-to-end based mobile network is an important task and it is particularly critical.This thesis is based on three aspects of the mobile network from end-to-end key agreement, encryption algorithm to data integrity, to protect end-to-end security based on mobile network. Through the safety analysis and research, we have put forward the new end-to-end security theory and algorithms based on mobile network. Based on self-generated certificate public key cryptography system, we design an end-to-end key agreement protocol. To generate a secure elliptic curve algorithm, we improve complex multiplication and achieve the generation of secure elliptic curves rapidly. Combined with the hash chain technology and based one-way hash chain algorithm improvements, we proposed a two-way authentication and end-to-end integrity algorithm.Since the bandwidth of the mobile network is limited and the mobile terminal is powerless computing etc., applications based on mobile network need much higher security requirements, but less complexity security algorithm to perform. Through software programming and testing, experiments show that the proposed security algorithms have met the security requirements. At the same time, the research results of this thesis can also be as a candidate for3G network security algorithms, further promote the development of mobile networks of China.
Keywords/Search Tags:end-to-end, elliptic curve algorithm, key agreement, integrity algorithm
PDF Full Text Request
Related items