{"title":"LTE系统中一种新的窃听密钥提取方法","authors":"Jianhua Peng, Wenjian Zhang, Kaizhi Huang","doi":"10.1109/ICIST.2013.6747829","DOIUrl":null,"url":null,"abstract":"The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A novel key derivation method for eavesdropper in LTE system\",\"authors\":\"Jianhua Peng, Wenjian Zhang, Kaizhi Huang\",\"doi\":\"10.1109/ICIST.2013.6747829\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.\",\"PeriodicalId\":415759,\"journal\":{\"name\":\"2013 IEEE Third International Conference on Information Science and Technology (ICIST)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE Third International Conference on Information Science and Technology (ICIST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIST.2013.6747829\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIST.2013.6747829","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel key derivation method for eavesdropper in LTE system
The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.