DocumentCode :
260216
Title :
Modifying authentication techniques in mobile communication systems
Author :
Hassan, Zakaria Zakaria ; Elgarf, Talaat A. ; Zekry, Abdelhalim
Author_Institution :
Commun. Eng. Dept., Higher Technol. Inst., Cairo, Egypt
fYear :
2014
fDate :
April 29 2014-May 1 2014
Firstpage :
38
Lastpage :
44
Abstract :
Milenage algorithm applies the block cipher Rijnadael (AES) with 128 bit key and 128 bit block size. This algorithm is used in the 3GPP authentication and key generation functions (f1, f1*, f2, f3, f4, f5 and f5*) for mobile communication systems (GSM/UMTS/LTE). In this paper a modification of Milenage algorithm is proposed through a dynamic change of S-box in AES depending on secret key. To get a new secret key for every authentication process we add the random number (RAND) transmitted from the authentication center (AUC) to the contents of the fixed stored secret key (Ki) and thus the initialization of the AES will be different each new authentication process. For every change in secret key a new S-box is derived from the standard one by permuting its rows and columns with the help of a new designed PN sequence generator. A complete simulation of modified Milenage and PN sequence generator is done using Microcontroller (PIC18F452). Security analysis is applied using Avalanche test to compare between the original and modified Milenage. Tests proved that the modified algorithm is more secure than the original one due to the dynamic behavior of S-box with every change of the secret key and immunity against linear and differential cryptanalysis using Avalanche tests. This makes the modified Milenage more suitable for the applications of authentication techniques specially for mobile communication systems.
Keywords :
3G mobile communication; cryptography; microcontrollers; telecommunication security; 3GPP authentication function; AES; AUC; GSM system; Global System for Mobile Communication; LTE system; Long-Term Evolution; Milenage algorithm; PIC18F452 microcontroller; RAND; Rijnadael block cipher; UMTS system; Universal Mobile Telecommunication System; advanced encryption standard; authentication center; authentication techniques; avalanche test; key generation function; mobile communication system; random number; secret key; security analysis; Authentication; Ciphers; Generators; Heuristic algorithms; Long Term Evolution; Mobile communication; Vectors; AES; Authentication vector (AV); Dynamic S-BOX and PN Sequence Generator(LFSR); F1∗; F2; F3; F4; F5; F5∗); Modified MILENAGE Algorithm for AKA Functions (F1;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2014 Third International Conference on
Conference_Location :
Beirut
Print_ISBN :
978-1-4799-3905-3
Type :
conf
DOI :
10.1109/CyberSec.2014.6913969
Filename :
6913969
Link To Document :
بازگشت