Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Enhanced encryption and integrity protection method

An integrity protection and algorithm technology, applied in the field of communication, can solve problems such as the inability to meet the security strength, and achieve the effects of small changes, improved security strength, and increased flexibility

Inactive Publication Date: 2010-10-13
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] b) It cannot meet the requirements of security strength under different conditions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enhanced encryption and integrity protection method
  • Enhanced encryption and integrity protection method
  • Enhanced encryption and integrity protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] An enhanced encryption and integrity protection method of the present invention is an improvement based on the existing confidentiality and integrity protection mechanism of LTE / SAE. The original system only supports encryption and integrity algorithms with a key length of 128 bits , the invention enables the system to flexibly support encryption and integrity algorithms with key lengths of 128 bits and 256 bits.

[0078] Concrete scheme of the present invention is as follows:

[0079] i. The key negotiation layer conducts algorithm negotiation and determines the algorithm identification. In order to support two key lengths of 128 bits and 256 bits, the highest bit of the 4-bit algorithm identification is used as the identification key length. When the highest bit is 0, the key length is 128 bits, and when the highest bit is 1, the key length is 256 bits.

[0080] ii. In the key derivation level, determine whether to derive a 128-bit truncated key or a 256-bit non-tru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an enhanced encryption and integrity protection method, and belongs to the field of network communication. The method comprises the following steps of: 1) allocating a 4-bit algorithm identifier to each algorithm supported by an LTE / SAE system in advance, wherein the algorithm identifier comprises a key length of the highest bit identification algorithm; 2) performing algorithm negotiation on a key negotiation layer to determine an algorithm used for communication between entities, wherein the entities comprise user equipment, an access network and a core network; 3) calculating a communication key by using the entities according to the negotiated algorithm and a permanent key, and determining the length of the exported key according to the algorithm identifier in the calculation process; and 4) in the communication process, performing encryption or integrity protection on messages according to the negotiated algorithm and the exported key. Compared with the prior art, the method improves the strength of algorithms supported by the system and the flexibility of an encryption and integrity protection mechanism.

Description

technical field [0001] The invention is mainly applied in the communication field, and in particular relates to a safety protection method for ensuring data confidentiality and integrity in communication. Background technique [0002] LTE / SAE is 3GPP's evolution technology for UMTS, which supports peak rates of 100Mbps downlink and 50Mbps uplink under 20MHz spectrum bandwidth. The LTE / SAE network consists of user equipment, access network and core network. [0003] The communication in the network mainly includes the communication between the user equipment (UE) and the access network (eNB), and the communication between the user and the core network (MME). Among them, the communication between the user and the core network is completed indirectly through the eNB. Therefore, the security of the LTE / SAE system includes two aspects: the security of the access stratum (AS) and the security of the non-access stratum (NAS). The security of the AS layer can be subdivided into AS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/10H04W12/033H04W12/041H04W12/106
Inventor 冯秀涛周春芳
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products