Akman et al., 2018 - Google Patents
Providing Identity Privacy in 5G Networks by Using PseudonymsAkman et al., 2018
View PDF- Document ID
- 14707305278139842197
- Author
- Akman G
- Niemi V
- Junnila V
- Publication year
External Links
Snippet
This thesis also mentions about a block cipher called KASUMI, which is used for encrypting and decrypting pseudonym during AKA in the prototype. Since KASUMI is designed specifically for 3GPP and cryptanalyses show it is still safe to use KASUMI, it was chosen to …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Braeken et al. | Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks | |
Lai et al. | SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks | |
Seddigh et al. | Security advances and challenges in 4G wireless networks | |
US8627092B2 (en) | Asymmetric cryptography for wireless systems | |
Khan et al. | A survey of subscription privacy on the 5G radio interface-the past, present and future | |
US20110004758A1 (en) | Application Specific Master Key Selection in Evolved Networks | |
CN101405987B (en) | Asymmetric cryptography for wireless systems | |
Liu et al. | Toward a secure access to 5G network | |
Elouafiq | Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms | |
Cattaneo et al. | Security Issues and Attacks on the GSM Standard: a Review. | |
Mobarhan et al. | Evaluation of security attacks on UMTS authentication mechanism | |
Muthana et al. | Analysis of user identity privacy in LTE and proposed solution | |
Saxena et al. | BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users | |
Abdo et al. | EC-AKA2 a revolutionary AKA protocol | |
Leu et al. | Improving security level of LTE authentication and key agreement procedure | |
Jiménez et al. | Subscription identifier privacy in 5G systems | |
Akman et al. | Providing Identity Privacy in 5G Networks by Using Pseudonyms | |
Chu et al. | Secure data transmission with cloud computing in heterogeneous wireless networks | |
Farhat et al. | An extended authentication and key agreement protocol of UMTS | |
Sher et al. | Network access security management (NASM) model for next generation mobile telecommunication networks | |
Haddad et al. | SEPS-AKA: A secure evolved packet system authentication and key agreement scheme for LTE-A networks | |
El-Sakka et al. | Double Evolved Packet System Authentication and Key Agreement Protocol Based on Elliptic Curve for 4G (LTE) Networks | |
Ozhelvaci | Secure and efficient authentication schemes for 5G heterogeneous networks | |
Shi et al. | Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol | |
Fidelis et al. | ENHANCED ADAPTIVE SECURITY PROTOCOL IN LTE AKA |