{"title":"基于混沌系统的3G安全认证加密算法","authors":"Chen-Guang He, S. Bao","doi":"10.1109/YCICT.2010.5713117","DOIUrl":null,"url":null,"abstract":"AKA protocol is widely used for mutual authentication process of 3G communication system. The generation and the strength of cipher key during this process are the key problems about security. Some mathematic tools could be used to improve this performance of these features like Lorenz equations, which are a class of three-dimensional ordinary differential equations similar to the iterative equation with particular initial values and parameters in some cases. In fact, the value of sequence generated by Lorenz equation is of chaos characteristic. Appropriate pretreatment and quantification way can be adopted to transform them into two value chaos charactyeristic. Followed by using bit shift encryption method, it can provide more flexible and controllable of the encryption key to enhance the security of 3G air interface. This kind of encryption method achieved better results in terms of the key space and efficiency compared with standard encryption approach and one-dimensional Logistic chaotic encryption methods.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An encryption algorithm based on chaotic system for 3G security authentication\",\"authors\":\"Chen-Guang He, S. Bao\",\"doi\":\"10.1109/YCICT.2010.5713117\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"AKA protocol is widely used for mutual authentication process of 3G communication system. The generation and the strength of cipher key during this process are the key problems about security. Some mathematic tools could be used to improve this performance of these features like Lorenz equations, which are a class of three-dimensional ordinary differential equations similar to the iterative equation with particular initial values and parameters in some cases. In fact, the value of sequence generated by Lorenz equation is of chaos characteristic. Appropriate pretreatment and quantification way can be adopted to transform them into two value chaos charactyeristic. Followed by using bit shift encryption method, it can provide more flexible and controllable of the encryption key to enhance the security of 3G air interface. This kind of encryption method achieved better results in terms of the key space and efficiency compared with standard encryption approach and one-dimensional Logistic chaotic encryption methods.\",\"PeriodicalId\":179847,\"journal\":{\"name\":\"2010 IEEE Youth Conference on Information, Computing and Telecommunications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE Youth Conference on Information, Computing and Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/YCICT.2010.5713117\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/YCICT.2010.5713117","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An encryption algorithm based on chaotic system for 3G security authentication
AKA protocol is widely used for mutual authentication process of 3G communication system. The generation and the strength of cipher key during this process are the key problems about security. Some mathematic tools could be used to improve this performance of these features like Lorenz equations, which are a class of three-dimensional ordinary differential equations similar to the iterative equation with particular initial values and parameters in some cases. In fact, the value of sequence generated by Lorenz equation is of chaos characteristic. Appropriate pretreatment and quantification way can be adopted to transform them into two value chaos charactyeristic. Followed by using bit shift encryption method, it can provide more flexible and controllable of the encryption key to enhance the security of 3G air interface. This kind of encryption method achieved better results in terms of the key space and efficiency compared with standard encryption approach and one-dimensional Logistic chaotic encryption methods.