Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, network element, mobile terminal, system and computer program product for cryptographic algorithm negotiation

A computer program and cryptographic algorithm technology, which is applied in the field of cryptographic algorithm negotiation and can solve problems such as the weakening of cryptographic algorithms

Inactive Publication Date: 2017-03-22
NOKIA TECHNOLOGLES OY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During this time period, in general, cryptographic algorithms may become weaker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, network element, mobile terminal, system and computer program product for cryptographic algorithm negotiation
  • Method, network element, mobile terminal, system and computer program product for cryptographic algorithm negotiation
  • Method, network element, mobile terminal, system and computer program product for cryptographic algorithm negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In the following description, for purposes of explanation, details are set forth in order to provide a thorough understanding of the disclosed embodiments. It is apparent, however, to one skilled in the art that the embodiments may be practiced without these specific details or with an equivalent arrangement.

[0025] figure 1 A wireless system according to an embodiment is shown. Although this and other embodiments described below are primarily discussed in the context of a GSM network, those skilled in the art will appreciate that the present disclosure is not so limited. In fact, various aspects of the present disclosure can be used with any wireless network that can benefit from enhanced cryptographic algorithm negotiation as described herein, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and other networks. The words "network" and "system" are often used interchangeably. A CDMA network may implement a radio technology such as Universal Terrestrial Radio Access (UTR...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Method, network element, mobile terminal, system and computer program product are disclosed for negotiating cryptographic algorithm. The method comprises: receiving a first candidate list from the mobile terminal by the network element, wherein the first candidate list includes at least one candidate cryptographic algorithm supported by the mobile terminal and excludes at least one undesirable cryptographic algorithm even though it is supported by the mobile terminal; and selecting, from the first candidate list, a cryptographic algorithm supported by both the network element and the mobile terminal. As the undesirable cryptographic algorithm(s) is excluded from the first candidate list,t he network element will be forced to choose more secure algorithms for communications with the mobile terminal.

Description

technical field [0001] Embodiments of the present disclosure relate generally to wireless communications, and more specifically, to cryptographic algorithm negotiation in wireless networks. Background technique [0002] In cellular networks, eavesdropping, impersonation or modification attacks can be carried out over a relatively large area. In principle, since the network has no actual control over the user's movements, it is fairly easy to actively steal a call. Security is therefore of paramount importance in wireless communication systems eg according to the Global System for Mobile Communications (GSM) or Universal Mobile Telecommunications System (UMTS) standards. It is now known that the GSM system suffers from security problems. For example, it is possible to retrieve the encryption key by breaking the A5 / 2 encryption algorithm. Currently, A5 / 1 is severely damaged. For example, communications secured by A5 / 1 can be listened to in real time. There are signs of wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/0431H04W12/0433
CPCH04L63/205H04W12/037H04W12/02H04L63/0428
Inventor 张大江S·霍尔特曼斯
Owner NOKIA TECHNOLOGLES OY