Font Size: a A A

Research On Key Technologies Of End-to-End Secure Transmission Systems

Posted on:2012-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y ShuFull Text:PDF
GTID:2178330332975425Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the integration of the mobile communication network and the Internet, many new mobile services are coming forth, such as mobile banking and mobile electronic commerce, which require higher security. The restriction of the available mobile terminal processing capacity and network resources leads to many security problems in the currrent mobile communication system security architectures. For example, it can not provide end-to-end data confidentiality, data integrity and digital signature service. Therefore, research on the key technologies of end-to-end secure transmission for the mobile communication networks is significant.At the beginning, the security architectures and the related problems of the 2Q 3G and LTE mobile communication systems are analyzed, as well as the feasibility of applying public key cryptography. Then, considering the advantages of the elliptic curve public key cryptosystem, such as high security, short key length and high calculation speed, a new protocol of end-to-end authentication and key agreement is discussed based on the elliptic curve cryptosystem, which is uesed for the mutual identity authentication and the negotiation of cipher key and integrity key between the two communicating identity. With Advanced Encryption Standard, the protocol can provide data confidentiality, data integrity, and non-repudiation security services. The system security can be greatly improved, and mobile services can be carried out smoothly.At the end, with the SVO logic, the authentication and key agreement protocol is proven in this paper. The conclusions show that the protocol can achieve end-to-end mutual identity authentication and key agreement, and the negotiation cipher key and integrity key are secure and fresh. Therefore, this protocol can satisfy the end-to-end security design requirements.
Keywords/Search Tags:End-to-End, Secure Transmission, Elliptic Curve Cryptography, Secure Transmission System, Authentication and Key Agreement, SVO logic
PDF Full Text Request
Related items