Title :
AKA security algorithm design based on chaotic mapping
Author :
Pei, Sheng-Lu ; Ma, Zhi-Li ; Li, Yi ; Ma, Yi-Zhong
Author_Institution :
Comput. Appl. Technol. Major, LanZhou Univ., Lanzhou, China
Abstract :
This paper analyzes the requirements of algorithms in AKA, which is the authenticated key exchange mechanism of 3G mobile communication system. An AKA security algorithm based on chaotic mapping is proposed. We establish a one-way Hash function based on chaotic mapping as the kernel function. Then all the encryption functions in AKA are redefined. Simulation results show that this method possesses the advantages such as good one-way, sensitivity to initial values and good data protection.
Keywords :
3G mobile communication; cryptography; telecommunication security; 3G mobile communication; AKA security algorithm; chaotic mapping; encryption function; kernel function; key exchange mechanism; one-way hash function; 3G mobile communication; Algorithm design and analysis; Authentication; Chaos; Chaotic communication; Communication system security; Cryptography; Data security; Information security; Kernel; AKA; Chaotic Mapping; One-Way Hash Function;
Conference_Titel :
Advanced Computer Control (ICACC), 2010 2nd International Conference on
Conference_Location :
Shenyang
Print_ISBN :
978-1-4244-5845-5
DOI :
10.1109/ICACC.2010.5487105