Authentication Techniques in Mobile Communications

Zakaria Zakaria Hassan Hassan;

Abstract


• Authentication in Mobile Communication Systems includes the authenticity of the subscriber as well as the network. Authentication of mobile subscribers and network operators is a challenge of future researchers due to increasing security threats and attacks with the enhanced volume of wireless traffic. Authentication schemes in mobile communication systems are initiated during IMSI attach, location registration, location update with serving network change, call setup (MOC, MTC), activation of connectionless supplementary services and short message services (SMS).

• MILENAGE algorithm is used in the 3GPP authentication and key generation functions (f1, f1*, f2, f3, f4, f5 and f5*) for mobile communication systems (GSM/UMTS/LTE/Advanced-LTE). The main core of Milenage algorithm is the Advanced Encryption Standard AES-128.

• The reason for modifying authentication techniques in mobile communication systems is the main weakness in Milenage, as stated by the cryptanalysts, is the use of bit rotations and constant XORs in the middle part of the milenage algorithm. Specially, if the kernel block cipher in milenage algorithm is susceptible to differential cryptanalysis, then an attacker is capable to do a variety of attacks on milenage algorithm. An attacker cannot predict any useful information if the kernel block cipher in milenage algorithm is a strong secure.

• In this thesis, Study of authentication techniques applied in mobile communications and their weak points to propose a suitable solution for designing strong techniques. A modification of Milenage algorithm is proposed through a dynamic change of S-box in the kernel block cipher AES-128 depending on secret key. To get a new secret key for every authentication process we add the random number (RAND) transmitted from the authentication center (AUC) to the contents of the fixed stored secret key and thus the initialization of the AES will be different each new authentication process . For every change in secret key a new S-box is derived from the standard one by permuting its rows and columns with the help of a new designed PN sequence generator. The result outputs of Modified MILENAGE Algorithm to derive a stronger Authentication Vector (AV) than output of standard Milenage Algorithm (AV) in 3GPP.

• This thesis is organized as follows: In Chapter 2, Authentication Schemes in Mobile Communication Systems are described. In Chapter 3, MILENAGE and AES-128 Algorithms are described. In Chapter 4 Modifying Authentication Techniques in Mobile Communication Systems is presented depending on the dynamic change of S-box in AES-128, the new Secret key for every authentication process and the new PN sequence generator. In Chapter 5, Simulation and Results, a complete simulation of the modified Milenage algorithm and the Avalanche test results are introduced. Finally, conclusions and future work are presented in


Other data

Title Authentication Techniques in Mobile Communications
Other Titles تقـنيات تحقيق المصداقية في اتصالات المحمول
Authors Zakaria Zakaria Hassan Hassan
Issue Date 2014

Attached Files

File SizeFormat
G6728.pdf643.47 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 1 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.