DocumentCode :
2678948
Title :
AKA security algorithm design based on chaotic mapping
Author :
Pei, Sheng-Lu ; Ma, Zhi-Li ; Li, Yi ; Ma, Yi-Zhong
Author_Institution :
Comput. Appl. Technol. Major, LanZhou Univ., Lanzhou, China
Volume :
5
fYear :
2010
fDate :
27-29 March 2010
Firstpage :
451
Lastpage :
453
Abstract :
This paper analyzes the requirements of algorithms in AKA, which is the authenticated key exchange mechanism of 3G mobile communication system. An AKA security algorithm based on chaotic mapping is proposed. We establish a one-way Hash function based on chaotic mapping as the kernel function. Then all the encryption functions in AKA are redefined. Simulation results show that this method possesses the advantages such as good one-way, sensitivity to initial values and good data protection.
Keywords :
3G mobile communication; cryptography; telecommunication security; 3G mobile communication; AKA security algorithm; chaotic mapping; encryption function; kernel function; key exchange mechanism; one-way hash function; 3G mobile communication; Algorithm design and analysis; Authentication; Chaos; Chaotic communication; Communication system security; Cryptography; Data security; Information security; Kernel; AKA; Chaotic Mapping; One-Way Hash Function;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computer Control (ICACC), 2010 2nd International Conference on
Conference_Location :
Shenyang
Print_ISBN :
978-1-4244-5845-5
Type :
conf
DOI :
10.1109/ICACC.2010.5487105
Filename :
5487105
Link To Document :
بازگشت