会议专题

AKA Security Algorithm Design Based On Chaotic Mapping

This paper analyzes the requirements of algorithms in AKA, which is the authenticated key exchange mechanism of 3G mobile communication system. An AKA security algorithm based on chaotic mapping is proposed. We establish a one-way Hash function based on chaotic mapping as the kernel function. Then all the encryption functions in AKA are redefined. Simulation results show that this method possesses the advantages such as good one-way, sensitivity to initial values and good data protection.

AKA Chaotic Mapping One-Way Hash Function

PEI Sheng-lu MA Zhi-li LI Yi MA Yi-zhong

Computer Applied Technology Major School of Information Science &Engineering,LanZhou University LanZhou,China

国际会议

The 2nd IEEE International Conference on Advanced Computer Control(第二届先进计算机控制国际会议 ICACC 2010)

沈阳

英文

451-453

2010-03-27(万方平台首次上网日期,不代表论文的发表时间)