Title :
Novel key management for 3G end-to-end encryption
Author :
Wang, Jian ; Jiang, Nan ; Li, Hui ; Niu, Xinxin ; Yang, Yixian
Author_Institution :
State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
Abstract :
People increasingly depend on the mobile communication networks, specially the third generation of mobile communication network (3G), to transmit data with one another. Although 3G networks implement data confidentiality and integrity within network components, but don´t offer user´s end-to-end confidentiality and integrity. End-to-end encryption could improve these vulnerabilities, and facilitates many security applications. The linchpin of end-to-end encryption is how to efficiently manage every key. A novel key management scheme is presented in this paper, fully using the speciality of 3G, which bases on three-party Diffie-Hellman key negotiation algorithm. It almost needs no modifications of the structure of 3G except that new software is added. Because the scheme needs no extra shared secret, it reduces the key storage of User Equipments (UE) and Authentication Centre to O(1). In addition, the troubles of the preassignment of shared secret and key update are omitted, and the mutual authentication and the lawful interception are provided.
Keywords :
3G mobile communication; cryptography; telecommunication security; 3G end-to-end encryption; 3G networks; authentication centre; end-to-end confidentiality; end-to-end integrity; key management; third generation of mobile communication network; three-party Diffie-Hellman key negotiation algorithm; user equipments; 3G mobile communication; Authentication; Cryptography; Data security; GSM; Hardware; Information security; Laboratories; Telecommunication switching; Wireless networks;
Conference_Titel :
Global Mobile Congress 2009
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-5302-3
Electronic_ISBN :
978-1-4244-5301-6
DOI :
10.1109/GMC.2009.5295873