ÄãºÃ£¬»¶Ó­À´µ½¾­¹ÜÖ®¼Ò [µÇ¼] [×¢²á]

ÉèΪÊ×Ò³ | ¾­¹ÜÖ®¼ÒÊ×Ò³ | Êղر¾Õ¾

3GµÄAKAЭÒéÖÐF1ÖÁF5µÄUE¶ËµÄʵÏÖ_ͨÐŹ¤³ÌרҵÂÛÎÄ

·¢²¼Ê±¼ä£º2015-01-24 À´Ô´£ºÈË´ó¾­¼ÃÂÛ̳
ͨÐŹ¤³ÌרҵÂÛÎÄ Ä¿ ¼ 1ÒýÑÔ 1 1.1¿ÎÌâ±³¾° 1 1.2¹úÄÚÍâÑо¿ÏÖ×´ 1 1.3±¾¿ÎÌâÑо¿µÄÒâÒå 1 1.4±¾¿ÎÌâµÄÑо¿·½·¨ 1 2AESËã·¨Ô­ÀíºÍCÓïÑÔ´úÂëÉè¼ÆʵÏÖ 2 2.1·Ö×éÃÜÂëÉè¼Æ×¼Ôò 2 2.2RijndaelËã·¨×ÛÊö 2 2.3Rijndael¼ÓÃܲ½Öè¼°CÓïÑÔ´úÂëʵÏÖ 4 2.3.1SubBytes 4 2.3.2ShiftRows 5 2.3.3MixColumns 7 2.3.4AddRoundKey 10 2.3.5¼ÓÃܹý³ÌÖ÷º¯Êý 14 3f1-f5Ëã·¨½éÉܼ°CÓïÑÔ´úÂëÉè¼ÆʵÏÖ 14 3.1f1-f5½éÉÜ 14 3.2f1-f5µÄCÓïÑÔ´úÂëʵÏÖ 16 4´úÂë²âÊԺͰ¸Àý 19 ½á ÂÛ 21 ²Î¿¼ÎÄÏ× 22 Ö л 23 Õª Òª Ëæ×ÅÒƶ¯Í¨ÐÅϵͳµÄ²»¶Ï·¢Õ¹£¬µÚÈý´úÒƶ¯Í¨ÐÅϵͳ£¨3G£©³ÉΪµ±Ç°Í¨ÐÅÁìÓòÑо¿¿ª·¢µÄÈȵ㡣ÔÚ3GϵͳÖУ¬Ðí¶àÐÂÐ͵ÄÊý¾ÝÒµÎñ½«¿ª·Å¡£ÔÚÒµÎñÔö¶àµÄͬʱ£¬ÏµÍ³°²È«ÎÊÌ⽫±äµÃ¸ü¼ÓÖØÒª¡£ AKAЭÒé¾ÍÊÇ3GϵͳÖÐÓÃÀ´ÊµÏÖÓû§ÖÕ¶ËÓëÈÏÖ¤·þÎñÆ÷¶ËµÄË«ÏòÈÏÖ¤¼°ÃÜÔ¿·ÖÅä»úÖƵÄÒ»¸ö°²È«Ð­Òé¡£3GPPΪ3GͨÐÅϵͳ¶¨ÒåÁË12ÖÖ¼øȨËã·¨£ºf0-f9£¬f1*ºÍf5*¡£AKAÀûÓÃÁËÆäÖеÄf0-f5*Ëã·¨¡£±¾´ÎÉè¼ÆΪÆäÖеÄf1-f5Ëã·¨ÔÚϵͳÓû§Öնˣ¨user's equipment,UE¶Ë£©µÄʵÏÖ¡£Éè¼Æ²ÉÓÃAES×÷ΪÄں˼ÓÃÜËã·¨£¬¼´RijndaelËã·¨¡£Òò´Ë£¬±¾´ÎÉè¼Æ´ÓAESÈëÊÖ£¬Í¨¹ý¶ÔAESµÄ¾ßÌå·ÖÎöºÍ´úÂëʵÏÖ£¬È»ºóÀûÓöÔAESµÄµ÷Óã¬ÊµÏÖf1-f5µÄ¹¦ÄÜ¡£ AKAЭÒéÖеÄÓû§ÖÕ¶ËÒ»°ãÖ¸ÖÇÄÜ¿¨£¬ÔÚ3GϵͳÖУ¬Ò²¾ÍÊǵÚÈý´úÊÖ»ú¿¨¡£ÓÉÓÚÖÇÄÜ¿¨É豸²»Ïñ¼ÆËã»úϵͳÄÇÑù³ä¹»×ãµÄ×ÊÔ´£¬Ò»°ã¶¼²ÉÓÃ8λϵͳ¡£Òò´ËÔÚÉè¼ÆÄÚºËËã·¨µÄʱºò£¬¿¼Âǵ½³ÌÐòÔÚʵÏÖÉÏ»¨·ÑµÄʱ¼ä×ÊÔ´ºÍÓ²¼þ×ÊÔ´ÎÊÌ⣬²ÉÓÃ8λµÄAESʵÏÖËã·¨£¬¶ø²»ÊÇ32λ¡£ÁíÍ⣬ÓÉÓÚ´Ë´ÎÉè¼Æ²ÉÓÃAESΪºËÐÄËã·¨£¬Òò´Ë»¹¶ÔAESÏà¹ØÊýѧ»ù´¡ÖªÊ¶£¬ÊµÏÖÔ­Àí×öÁËÏêϸµÄ·ÖÎöºÍÁ˽⡣ ¹Ø¼ü´Ê£ºAKA £»f1-f5 £»Rijndael the UE Implement of F1 to F5 for 3G AKA Protocl Abstract Along with mobile communication system unceasing development, the third generation mobile communication system(3G) becomes more and more hot in the current mobile communication domain. In 3G system, many new data services will open. Increases which while the services, the system safety question will become more and more important. The AKA protocol is a security protocol in the 3G system. It including seven algorithm: f1-f5, f1* and f5*. This design only involves f1-f5 on the user's equipment (UE) implement. This design is based on the AES encryption algorithm. So, in this article, contains two sides:f1-f5 and AES. Because we design for the user's equipment terminal, it involves a question about whether the system hardware resources sufficient. So, this design uses 8 bit AES encryption algorithm. Key words: AKA ; f1-f5 ; Rijndael
¾­¹ÜÖ®¼Ò¡°Ñ§µÀ»á¡±Ð¡³ÌÐò
  • ɨÂë¼ÓÈë¡°¿¼ÑÐѧϰ±Ê¼ÇȺ¡±
ÍƼöÔĶÁ
¾­¼ÃѧÏà¹ØÎÄÕÂ
±êÇ©ÔÆ
¾­¹ÜÖ®¼Ò¾«²ÊÎÄÕÂÍƼö