[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Akman et al., 2018 - Google Patents

Providing Identity Privacy in 5G Networks by Using Pseudonyms

Akman et al., 2018

View PDF
Document ID
14707305278139842197
Author
Akman G
Niemi V
Junnila V
Publication year

External Links

Snippet

This thesis also mentions about a block cipher called KASUMI, which is used for encrypting and decrypting pseudonym during AKA in the prototype. Since KASUMI is designed specifically for 3GPP and cryptanalyses show it is still safe to use KASUMI, it was chosen to …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]

Similar Documents

Publication Publication Date Title
Braeken et al. Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks
Lai et al. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
Seddigh et al. Security advances and challenges in 4G wireless networks
US8627092B2 (en) Asymmetric cryptography for wireless systems
Khan et al. A survey of subscription privacy on the 5G radio interface-the past, present and future
US20110004758A1 (en) Application Specific Master Key Selection in Evolved Networks
CN101405987B (en) Asymmetric cryptography for wireless systems
Liu et al. Toward a secure access to 5G network
Elouafiq Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms
Cattaneo et al. Security Issues and Attacks on the GSM Standard: a Review.
Mobarhan et al. Evaluation of security attacks on UMTS authentication mechanism
Muthana et al. Analysis of user identity privacy in LTE and proposed solution
Saxena et al. BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users
Abdo et al. EC-AKA2 a revolutionary AKA protocol
Leu et al. Improving security level of LTE authentication and key agreement procedure
Jiménez et al. Subscription identifier privacy in 5G systems
Akman et al. Providing Identity Privacy in 5G Networks by Using Pseudonyms
Chu et al. Secure data transmission with cloud computing in heterogeneous wireless networks
Farhat et al. An extended authentication and key agreement protocol of UMTS
Sher et al. Network access security management (NASM) model for next generation mobile telecommunication networks
Haddad et al. SEPS-AKA: A secure evolved packet system authentication and key agreement scheme for LTE-A networks
El-Sakka et al. Double Evolved Packet System Authentication and Key Agreement Protocol Based on Elliptic Curve for 4G (LTE) Networks
Ozhelvaci Secure and efficient authentication schemes for 5G heterogeneous networks
Shi et al. Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol
Fidelis et al. ENHANCED ADAPTIVE SECURITY PROTOCOL IN LTE AKA