Enhanced encryption and integrity protection method

An integrity protection and algorithm technology, applied in the field of communication, can solve problems such as the inability to meet the security strength, and achieve the effects of small changes, improved security strength, and increased flexibility

Inactive Publication Date: 2010-10-13
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] b) It cannot meet the requirements of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enhanced encryption and integrity protection method
  • Enhanced encryption and integrity protection method
  • Enhanced encryption and integrity protection method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0077] An enhanced encryption and integrity protection method of the present invention is an improvement on the basis of LTE / SAE's existing confidentiality and integrity protection mechanism. The original system only supports encryption and integrity algorithms with a 128-bit key length The invention enables the system to flexibly support encryption and integrity algorithms with 128-bit and 256-bit key lengths.

[0078] The specific scheme of the present invention is as follows:

[0079] i. The key agreement layer conducts algorithm negotiation and determines the algorithm identifier. In order to support two key lengths of 128 bits and 256 bits, the highest bit of the 4-bit algorithm identification is used as the identification key length. When the most significant bit is 0, the key length is 128 bits, and when the most significant bit is 1, the key length is 256 bits.

[0080] ii. Determine whether to derive a 128-bit truncated key or a 256-bit non-truncated key in the key derivat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enhanced encryption and integrity protection method, and belongs to the field of network communication. The method comprises the following steps of: 1) allocating a 4-bit algorithm identifier to each algorithm supported by an LTE/SAE system in advance, wherein the algorithm identifier comprises a key length of the highest bit identification algorithm; 2) performing algorithm negotiation on a key negotiation layer to determine an algorithm used for communication between entities, wherein the entities comprise user equipment, an access network and a core network; 3) calculating a communication key by using the entities according to the negotiated algorithm and a permanent key, and determining the length of the exported key according to the algorithm identifier in the calculation process; and 4) in the communication process, performing encryption or integrity protection on messages according to the negotiated algorithm and the exported key. Compared with the prior art, the method improves the strength of algorithms supported by the system and the flexibility of an encryption and integrity protection mechanism.

Description

technical field [0001] The invention is mainly applied in the communication field, and in particular relates to a safety protection method for ensuring data confidentiality and integrity in communication. Background technique [0002] LTE / SAE is 3GPP's evolution technology for UMTS, which supports peak rates of 100Mbps downlink and 50Mbps uplink under 20MHz spectrum bandwidth. The LTE / SAE network consists of user equipment, access network and core network. [0003] The communication in the network mainly includes the communication between the user equipment (UE) and the access network (eNB), and the communication between the user and the core network (MME). Among them, the communication between the user and the core network is completed indirectly through the eNB. Therefore, the security of the LTE / SAE system includes two aspects: the security of the access stratum (AS) and the security of the non-access stratum (NAS). The security of the AS layer can be subdivided into AS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/10H04W12/033H04W12/041H04W12/106
Inventor 冯秀涛周春芳
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products