Font Size: a A A

Research On And An Improved Proposal Of 3G Security

Posted on:2013-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:L WangFull Text:PDF
GTID:2248330371467408Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The type of business of mobile communications has become increasingly diverse, in addition to traditional voice and data services, e-commerce, mobile phone online shopping, travel and other new mobile phone application services gradually rise, lots of sensitive data are transmitted over wireless channel.Thus, the security requirements of mobile communications networks are becoming higher and higher,the promotion of the business which contains user-sensitive information is dependent on the trust of people on the network, so the study of 3G system’s security is of great significance.There are two main aspects to ensure the security of mobile communications, that is, the authentication and key agreement protocol and encryption algorithm. Around this two core points, this article has made thorough research on cryptography security technologies, including secure encryption algorithms, authentication, message integrity verification, non-repudiation services and so on. Then made profound study on GSM system’s security mechanisms and disscussed its security vulnerabilities.Next, made a detailed analysis of the 3G system authentication and key agreement protocol and pointed its improvements compared with GSM system and analyzed its security loopholes,then combined with the latest research of cryptography, introduced the technology of Elliptic Curve Cryptology and signature,proposed an improved proposal of 3G AKA protocol, the improved protocol has soloved the problem of IMSI exposure, no certification for network VLR, and authentication vectors’no secure transmission and some other issues.Finnaly, made a detailed analysis of the improved AKA protocol.In addition, made a detailed discussion of the process of encryption and integrity protection, designed the trigger conditions of authentication process, and gave the network authentication scheme of the coexistence of 2G and 3G networks. Finally, made a detailed analysis of 3G encryption and integrity protection algorithms and designed f8 and f9 algorithms based on the KASUMI and the composition of KASUMI algorithms, and evaluated the security of KASUMI with the theory of cryptography security.
Keywords/Search Tags:3G, security, mobile communications, encryption, authentication protocols
PDF Full Text Request
Related items