Font Size: a A A

Application Research Of Encryption Technology In 5G System

Posted on:2022-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:X F SunFull Text:PDF
GTID:2518306575483124Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of society,people put forward higher requirements for the efficiency of communication.For the next generation of communication technology 5G,the ITU has defined three representative service scenarios,including enhanced mobile broadband(eMBB),massive machine-type communications(m MTC)and ultra-reliable and low latency communications(u RLLC).Encryption technology can improve the security of communication in 5G systems.Different application scenarios require different encryption technologies for differentiated security protection.In eMBB with high-speed data,block cipher can be a good choice.In order to encrypt data of variable length,it is necessary to analyze the security and efficiency requirements and improve the mode of operation.According to the number of groups,the improved HCBC mode can dynamically adjust the number of feedback bytes in each group.HCBC mode has the same performance and security to CBC when processing less data.When processing more data,HCBC mode has similar performance to ECB with better security.The mMTC with massive resource-constrained devices should combine lightweight encryption with format-preserving encryption.The plaintext space and key update strategy of the existing algorithms can be improved.The t LF algorithm supplements the support for alphabet.The tLF algorithm can reduce the replacement table reconstruction operations that require higher computing power.When the adjustment factor is much larger than the number of plaintext characters,the t LF algorithm has better security.The uRLLC which has higher requirements for time delay can combine irreversible encryption with format-preserving encryption.In order to improve the randomness of the irreversible encryption result,a bitwise exclusive or between the key and the plaintext can be introduced before encryption.The t HF algorithm uses exclusive or and shift operations instead of modulo operations.The hardware implementation can greatly reduce the time consumed in the encryption and decryption process,and can perform fast operations on the64 printable characters in the ASCII table.Figure 15;Table 19;Reference 48...
Keywords/Search Tags:5G, mode of operation, lightweight encryption, format-preserving encryption, adjustment factor
PDF Full Text Request
Related items