Title :
An encryption algorithm based on chaotic system for 3G security authentication
Author :
He, Chen-Guang ; Bao, Shu-Di
Author_Institution :
Shenzhen Institutes of Adv. Technol., Chinese Acad. of Sci., Shenzhen, China
Abstract :
AKA protocol is widely used for mutual authentication process of 3G communication system. The generation and the strength of cipher key during this process are the key problems about security. Some mathematic tools could be used to improve this performance of these features like Lorenz equations, which are a class of three-dimensional ordinary differential equations similar to the iterative equation with particular initial values and parameters in some cases. In fact, the value of sequence generated by Lorenz equation is of chaos characteristic. Appropriate pretreatment and quantification way can be adopted to transform them into two value chaos characteristic. Followed by using bit shift encryption method, it can provide more flexible and controllable of the encryption key to enhance the security of 3G air interface. This kind of encryption method achieved better results in terms of the key space and efficiency compared with standard encryption approach and one-dimensional Logistic chaotic encryption methods.
Keywords :
3G mobile communication; chaos; cryptographic protocols; differential equations; public key cryptography; 3G security authentication; AKA protocol; Lorenz equations; bit shift encryption method; iterative equation; logistic chaotic encryption methods; ordinary differential equations; 3G; AKA; Lorenz equation; chaos; cipher key;
Conference_Titel :
Information Computing and Telecommunications (YC-ICT), 2010 IEEE Youth Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-8883-4
DOI :
10.1109/YCICT.2010.5713117