6781097240
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015
? ^ ? 7
XRES CK IR AK
Fig 7: Authentication vector computation 2.2.4 Integrity Protection and Encryption
Message origin authentication and integrity protection are provided using a MAC. In UMTS the MAC computation and Encryption are performed as shown in Fig 8.
PLAIN TEXT ( XOR )
Fig 8 : MAC computation and Encryption in UMTS The per- message MAC is computed as follows.
Per-message MAC= F9 (IK, COUNTi, FRESH, Direction, message)
The Integrity key IK is computed during authentication and key agreement phase, is used during the generation and verification of MAC. Two variables COUNTi ( seąuence number derived from the frame number) and FRESH ( a random number) are used to prevent replay attacks. At connection set up, COUNTi is initialized by the celi phone while FRESH is generated by the BSC. The Direction indicates from where the message is originated (BSC or Celi phone).
In UMTS, integrity check is performed only on signalling data, encryption is performed on both signalling and user data. A stream cipher is used and the key stream is a function of the cipher key CK, a frame count, COUNTc, the radio channel indication (bearer), and the direction indication.
KEYSTREAM= F8 ( CK, COUNTc, BEARER, DIRECTION, LENGTH)
The functions F8 and F9 are based on KASUMI, an 8 round fiestel cipher with 64 bit błock size and 128 bit key. For MAC generation, KASUMI in CBC (Cipher Błock Chaining ) modę used and key stream generation uses OFB (output feed back).
37
Wyszukiwarka
Podobne podstrony:
International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 ThInternational Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 coInternational Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 ThInternational Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 1.International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, April 2015 FoInternational Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, AprilInternational Journal of Computer Science & Engmeenng Survey (UCSES) Vol.6, No.2, April 2015 sevInternational Journal of Computer Science & Engmeenng Survey (UCSES) Vol.6, No.2, April 2015 FigInternational Journal of Computer Science & Engmeenng Survey (UCSES) Vol.6, No.2, April 2015 2.2International Journal of Computer Science & Engineenng Survey (UCSES) Vol.6, No.2, Apnl 2015SecuInternational Journal of Computer Science & Engmeenng Survey (UCSES) Vol.6, No.2, April 20157.International Journal of Computer Science & Engmeenng Survey (IJCSES) Vol.6, No.2, April 2015 4.International Journal of Computer Science & Engmeenng Survey (IJCSES) Vol.6, No.2, April 2015 4.International Journal of Computer Science & Engmeenng Survey (IJCSES) Vol.6, No.2, April 2015 2.International Journal of Computer Science & Engmeenng Survey (IJCSES) Vol.6, No.2, April 2015 GSIJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 201012 IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010 www.IJCSIIJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 201014 IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010 www.IJCSIwięcej podobnych podstron