{"title":"A novel key derivation method for eavesdropper in LTE system","authors":"Jianhua Peng, Wenjian Zhang, Kaizhi Huang","doi":"10.1109/ICIST.2013.6747829","DOIUrl":null,"url":null,"abstract":"The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIST.2013.6747829","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.