Enhanced security design for cryptography in mobile communication systems
A mobile communication network, security technology, applied in the field of encryption problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] It may be useful first to briefly analyze the fundamental security flaws in GSM. One flaw in the current design is that the keys for all algorithms are derived in the same way independent of the encryption algorithm to be used. If this is not the case, then the deciphering of A5 / 2 is exactly intended for this, and the second and third types mentioned in the background section cannot be used to intercept traffic protected with other algorithms.
[0039]Furthermore, the severity of design errors is increased by the fact that the signaling is unprotected (no network authentication and thus no integrity or replay protection). As mentioned, this is corrected in UMTS. Perhaps it seems that improving the security of GSM to the extent of UMTS will solve this problem. However, this requires changing the AuC (Authentication Center), base station, terminal and SIM (Subscriber Identity Module) card, and this would be a very expensive solution to the problem.
[0040] On the othe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com