AKA Security Algorithm Design Based On Chaotic Mapping
This paper analyzes the requirements of algorithms in AKA, which is the authenticated key exchange mechanism of 3G mobile communication system. An AKA security algorithm based on chaotic mapping is proposed. We establish a one-way Hash function based on chaotic mapping as the kernel function. Then all the encryption functions in AKA are redefined. Simulation results show that this method possesses the advantages such as good one-way, sensitivity to initial values and good data protection.
AKA Chaotic Mapping One-Way Hash Function
PEI Sheng-lu MA Zhi-li LI Yi MA Yi-zhong
Computer Applied Technology Major School of Information Science &Engineering,LanZhou University LanZhou,China
国际会议
The 2nd IEEE International Conference on Advanced Computer Control(第二届先进计算机控制国际会议 ICACC 2010)
沈阳
英文
451-453
2010-03-27(万方平台首次上网日期,不代表论文的发表时间)