Earticle

현재 위치 Home

Authentication of PCSs with Cascaded Encryption Technique

첫 페이지 보기
  • 발행기관
    한국AI디지털융합학회(구 한국디지털융합학회) 바로가기
  • 간행물
    IJICTDC 바로가기
  • 통권
    Vol 5 No 1 (2020.06)바로가기
  • 페이지
    pp.28-39
  • 저자
    Rajan Kaushal, Randeep Singh
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A379583

※ 기관로그인 시 무료 이용이 가능합니다.

4,300원

원문정보

초록

영어
In this paper, a new algorithm is proposed using the technique of Cascaded Encryption (CE) for authentication of small handheld and Portable Communication Systems (PCSs). In the proposed method an 8-bit session key Ks is sent to the Mobile Station (MS) from the Authentication Center (AuC) as soon as the MS is switched on in the GSM network. The MS computes a cipher key for authentication KCA using the Recursive Positional Module-2 Substitution (RPMS) cryptographic technique. The technique of Cascaded Encryption (CE) considers the 128-bit International Mobile Subscribers’ Identification (IMSI) i.e. Ki as a stream. This stream is then divided into 16 groups each of which contains 8 bits. These groups are represented as G0 to G15. The corresponding bits of each group are put through repetitive Exclusive OR (XOR) operation with the adjacent bit until it generates a single bit number. Hence each group forms a triangular bit pattern. From these triangular bit patterns, the target block T is formed which consists of 16 bits, t0 to t15, which are generated from the groups G0 to G15. Further T is divided into two sub-blocks T0 and T1 consisting of bits t0...t7 and t8...t15 respectively. The bits of the blocks T0 and T1 are put through XOR operation with the corresponding bits of the session key Ks in two different steps to obtain C0 and C1 respectively. The bitstreams C0 and C1 are concatenated to form the 16 bits intermediate key Kim. Kim is put through the mechanism of the Rotor Machine where the direction of the bits depends on the cipher key for authentication KCA. The Rotor Machine generates the 16-bit SRES. Authentication Center (AuC) computes the SRES independently in a similar method and sends SRES and Ks to Home Location Register (HLR). HLR compares SRES obtained from AuC with SRES obtained from MS to confirm its identity.

목차

Abstract
1. Introduction
2. Authentication of a PCS in GSM network
2.1 Existing Algorithm for authentication of MS in GSM Network
3. Encryption using Recursive Positional Module-2 Substitution (RPMS)
3.1 The Technique
4. Overview of the triangularization operation
5. Rotor machine
6. Proposed Cascaded Encryption (CE) on PCS for Authentication in GSM Network
7. Example
6.1 Authentication Algorithm using CE:
6.2 Time Complexity of the Algorithm
8. Analysis of the results
9. Conclusion
References

키워드

Block Cipher Portable Communication Systems (PCSs) Session Key Cascaded Encryption Rotor Machine

저자

  • Rajan Kaushal [ School of Computer Applications Lovely Professional University, Punjab 144411, India ] Corresponding Author
  • Randeep Singh [ School of Computer Applications Lovely Professional University, Punjab 144411, India ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    한국AI디지털융합학회(구 한국디지털융합학회) [The Korean Academic Society of AI Digital Convergence]
  • 설립연도
    2015
  • 분야
    사회과학>경영학
  • 소개
    본 학회는 디지털 경영에 관련된 디지털 미디어, 디지털 통신, 디지털 방송, 디지털 콘텐츠, 디지털 문화, 디지털 사회, 디지털 유통, 디지털 금융, 디지털 물류, 디지털 정책, 디지털 기술, 디지털 교육 그리고 디지털과 아날로그의 비교 등에 대한 학제간 연구와 실사구시적인 적용을 통하여 디지털 경영의 발전과 한국이 세계적인 디지털 강국으로 성장하기 위한 학술적인 기반과 실무적인 지침을 조성하는 것을 목적으로 하고 있습니다.

간행물

  • 간행물명
    IJICTDC [International Journal of Information Communication Technology and Digital Convergence]
  • 간기
    반년간
  • pISSN
    2466-0094
  • 수록기간
    2016~2025
  • 십진분류
    KDC 300 DDC 303

이 권호 내 다른 논문 / IJICTDC Vol 5 No 1

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장