2010年11月12日星期五
3 g AKA F1 to F5 in the agreement of the UE-end implementation _ financial management papers
Includes papers, design, paper words: 7889, pages: to pick the 28 with mobile communication system, third-generation mobile communications system (3G) becomes the current research and development in the field of communications. In the 3 g system, many new data services will open. The increase in business at the same time, the system security issues will become more important. AKA Protocol is the 3 g system used to implement user terminal and authentication server-side of a two-way authentication and key distribution mechanism of a security agreement. 3GPP 3 g communication system defines 12 kinds of authentication algorithm: f0-f9, f5 f1 * and *. AKA leverages its f0-f5 * algorithm. This design is one of the algorithm in the system user f1-f5 Terminal (user'sequipment, UE). Design uses AES encryption algorithm as a kernel, i.e. the Rijndael algorithm. Therefore, this design from AES, through the analysis of specific AES and code implementation, and then use a call to AES, the implementation of the function. f1-f5 AKA agreement user terminal usually means a smart card in 3 g system, which is the third-generation mobile phone card. Since the smart card devices like computer system as sufficient enough resources, generally using 8-bit system. In designing a kernel algorithm, considering the program in the achievement of the time spent on the issue of resources and hardware resources, using 8-bit AES algorithm, not 32 bits. In addition, because of this design uses the AES algorithm for core and therefore also on AES related mathematical basis knowledge, realization of the principle of detailed analysis and understanding. Keywords: AKA; f1-f5; Rijndaelthe UE Implement of F1 to F5 for 3G AKA ProtocolAbstractAlong with mobile communication system unceasing development, thethird generation mobile communication system (3G) becomes the current mobile hotspot in the communication domain. In the 3G system,many new data services will open. Increases whichwhile the service, the system safety question will become more andmore important.The AKA protocol is a security protocol in the 3G system. Itincluding seven algorithm: f1-f5, f1* and f5*. This design onlyinvolves f1-f5 on the user's equipment (UE) implement. This designis based on the AES encryption algorithm. So, in this article,contains two sides:f1-f5 and AES.Because we design for the user's equipment terminal, it involves aquestion about whether the system hardware resources sufficient.So, this design uses 8 bit AES encryption algorithm.Key words: AKA ; f1-f5 ; Rijndael recorded from introduction 1 11.1 background 11.2 topics domestic and foreign 11.3 of the significance of the topic research 11.4 this subject 12 research methods AES algorithm theory and C language code 22.1 design implementation block cipher 22.2 design criteria summary of Rijndael algorithm 22.3 Rijndael encryption steps and C language 42.3.1 code implementation SubBytes 42.3.2 ShiftRows 52.3.3 MixColumns 72.3.4 AddRoundKey 102.3.5 encryption process 143 main function f1-f5 algorithm introduction and c language code 143.1 design implementation introduction 143.2 f1-f5 f1-f5 of C language 164 code implementation code testing and case 19 knots on 21 22 references caused by Xie sound 23 Ming 24 above is part of the contents of this paper, there is a need for full papers of netizens can see r /><<论文共享要求>>也可直接通过QQ:136775125联系.更多相关论文请点击计算机全套毕业设计查找.
订阅:
博文评论 (Atom)
没有评论:
发表评论