Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for preventing attack for SIM card decoding

An offensive and random number technology, applied in the field of communication, can solve problems such as insufficient security of the detection process, potential safety hazards, and failure to effectively prevent SIM card cracking attacks.

Active Publication Date: 2011-09-28
CHINA MOBILE COMM GRP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] To sum up, the detection process adopted by the existing SIM card for the received authentication random number is not secure enough, and cannot effectively prevent cracking attacks on the SIM card, and there are great security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for preventing attack for SIM card decoding
  • Method and apparatus for preventing attack for SIM card decoding
  • Method and apparatus for preventing attack for SIM card decoding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to effectively prevent attackers from cracking the SIM card by using the defect of the SIM card authentication algorithm, in the embodiment of the present invention, when the SIM card receives the authentication random number sent by the user, every time it reaches a set time point, A random number is generated, and at least one random number extraction point Pnext is calculated in combination with preset parameters; when the Pnext is reached, the SIM card saves the received authentication random number into the preset detection encrypted EF file to update The EF file, and according to the EF file, detects the authentication random number received after the Pnext.

[0037] Preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0038] refer to figure 2As shown, in this embodiment, the SIM card includes a storage unit 100, a communication unit 101, a first processing unit 102, a second p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for preventing attack for SIM card decoding. The method includes: in the process of receiving the authentication random number transmitted by users, once arriving at a setting time point, the SIM card generates a random number, and figures out at least a random number sample point Pnext in combination with prearranged parameters; when arriving at the Pnext, the SIM card stores the received authentication random number in the prearranged testing ciphering EF encrypted file to update the EF file; the SIM card, in accordance with the EF file, detects the authentication random number received after the Pnext. So that, determination of each Pnext is filled with random, thereby the attacker cannot detect the updating rule of the EF file, is difficult to avoid the SIM card detection process upon transmitting the attack random number, and cannot realize the attack for SIM card decoding, thereby greatly improving the safety of the authentication operation of the SIM card. At the same time, the present invention discloses a SIM card.

Description

technical field [0001] The invention relates to the field of communications, in particular to a method and device for preventing SIM card cracking attacks. Background technique [0002] At present, in the GSM network, the SIM card uses the Comp128-1 (A3 / A8) algorithm to authenticate the received data. The Comp128-1 algorithm is a FFT-Hash algorithm, and its algorithm structure is: 8 rounds of large cycles and each round The big cycle is embedded with 5 rounds of small cycles. The Comp128-1(A3 / A8) algorithm has defects in the algorithm structure, so that two different authentication random numbers can obtain the same ciphertext after being operated by the Comp128-1 algorithm. This phenomenon is called "collision". The "collision" phenomenon can be used to crack the SIM card to obtain the key KI of the SIM card, so as to clone the SIM card according to the obtained key KI. Up to now, all the attacks on SIM cards by attacking software are aimed at the 2-5 rounds of small loop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/122H04W12/40
Inventor 粟栗罗红刘斐裴志刚侯海涛
Owner CHINA MOBILE COMM GRP CO LTD