Enhanced security design for cryptography in mobile communication systems

A mobile communication network, security technology, applied in the field of encryption problems

Active Publication Date: 2006-11-01
TELEFON AB LM ERICSSON (PUBL)
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, there may be security issues involved when roaming between different types of networks such as GSM and UMTS networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enhanced security design for cryptography in mobile communication systems
  • Enhanced security design for cryptography in mobile communication systems
  • Enhanced security design for cryptography in mobile communication systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] It may be useful first to briefly analyze the fundamental security flaws in GSM. One flaw in the current design is that the keys for all algorithms are derived in the same way independent of the encryption algorithm to be used. If this is not the case, then the deciphering of A5 / 2 is exactly intended for this, and the second and third types mentioned in the background section cannot be used to intercept traffic protected with other algorithms.

[0039]Furthermore, the severity of design errors is increased by the fact that the signaling is unprotected (no network authentication and thus no integrity or replay protection). As mentioned, this is corrected in UMTS. Perhaps it seems that improving the security of GSM to the extent of UMTS will solve this problem. However, this requires changing the AuC (Authentication Center), base station, terminal and SIM (Subscriber Identity Module) card, and this would be a very expensive solution to the problem.

[0040] On the othe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A basic idea according to the invention is to enhance or update the basic cryptographic security algorithms by an algorithm-specific modification of the security key information generated in the normal key agreement procedure of the mobile communication system. For communication with the mobile terminal, the network side normally selects an enhanced version of one of the basic cryptographic security algorithms supported by the mobile, and transmits information representative of the selected algorithm to the mobile terminal. The basic security key resulting from the key agreement procedure (AKA, 10) between the mobile terminal and the network is then modified (22) in dependence on the selected algorithm to generate an algorithm-specific security key. The basic security algorithm (24) is then applied with this algorithm-specific security key as key input to enhance security for protected communication in the mobile communications network.

Description

technical field [0001] The present invention relates generally to encryption issues in communication systems, and more particularly to security enhancements for GSM (Global System for Mobile Communications), UMTS (Universal Mobile Telecommunications System) and similar communication systems. Background technique [0002] In mobile communications, eg according to the GSM or UMTS standards, security is extremely important. This is closely related to the growing use of mobile communications in business contacts as well as in private communications. For example, it is now known that GSM has security problems. As recently described in Ref. [1], it is possible to retrieve the encryption key by deciphering the A5 / 2 cipher algorithm. There are three basic algorithm choices A5 / 1, A5 / 2, A5 / 3 for circuit switched data, and three basic algorithms GEA1, GEA2 and GEA3 for packet data. It should be noted, however, that there are also stronger 128-bit algorithms denoted A5 / 4 and GEA4. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32H04L29/06H04W12/00H04W12/02H04W12/04
CPCH04L63/0428H04L63/06H04W12/02H04L9/0844H04L9/3273H04L2209/80H04W12/037H04W12/033H04W12/041H04W12/0433H04W12/0431H04W12/062H04W12/069
Inventor R·布洛姆M·奈斯伦德J·阿科
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products