Dissertation > Excellent graduate degree dissertation topics show

The third generation mobile communication system encryption and authentication algorithms Analysis and Simulation

Author: MaSuoTang
Tutor: ZhouLiang
School: University of Electronic Science and Technology
Course: Cryptography
Keywords: KASUMI differential cryptanalysis linear cryptanalysis
CLC: TN929.53
Type: Master's thesis
Year: 2002
Downloads: 196
Quote: 1
Read: Download Dissertation


The information security as one of the primary considering aspects in the Third Generation Mobile Communication System (3G), in which encryption algorithm f8 and integrity algorithm f9 are the main standard security algorithms, takes into special account.In this paper, the general structure of block cipher together with its related properties is firstly discussed, then the main non-linear component of S-boxes in block cipher is analyzed.As to the Boolean Function in binary field, We studied its Non-linearity, Linearity Structure, Output Bit Independence Criterion (BIG), Balance, Completeness, Strict Avalanche Criterion, Propagation Criterion, Correlation Immunity, Linear Approximation Table and XOR Distribution Table .We also discussed the Pile-up Lama used to compute the combination linear probability and showed an instance of its application. The differential probability and linear probability is defined and the approximation expression to compute the maximum differential and linear probability of while SPN’s from the single round’s differential and linear probability is presented. As far as KASUMI algorithm is concerned, we get the maximum probability of differential and linear through computing the S7 box and S9 box’s differential and linear probability. Thus, we prove it is secure against differential and linear cryptanalysis.In the end, quick implementation of KASUMI, f8 and f9 are simulated under the condition of Windows 98 with Celeron 633 and 128M memory, the simulation data show that the f8 algorithm is capable of achieving the encryption rate up to 1.9Mbit/s, while f9 algorithm only takes 20ms to compute the MAC with the length of 5114 bits, both of which can reach the basica requirement of 3G.

Related Dissertations

  1. Plumbagin enhanced TRAIL-induced Kasumi-1 cells and its mechanism research,R285.5
  2. Research of the Block Ciphers’ Capability to Asist the Differential Cryptanalysis,TN918.2
  3. Security Test on Key Components of Block Ciphers and Research on Practical Securty Against Differential Cryptanalysis and Linear Cryptanalysis,TN918.1
  4. AML1/ETO siRNA Enhances the Sensitivity of Kasumi-1 Cells to Histone Acetylation Enzyme Inhibitors,R733.7
  5. Russia Cryptographic Service System,TN918.1
  6. The Study on the Human Acute Myeloid Leukemia Kasumi-1 Cells Apoptosis Induced by Puerariae Radix Flavones in Vitro,R285
  7. WCDMA Communication Network Security Technology Research,TN929.533
  8. Cryptanalysis of Block Cipher Blow-CAST-Fish,TN918.1
  9. Research of Linear Hull for Block Cipher,TN918.1
  10. Research on Technology of Differential Cryptanalysis in Cipher System,TN918.1
  11. Analysis and Application of Nonlinear Combination Sequence,O157.4
  12. The design and analysis of block cipher,O157.4
  13. Impossible Differential Cryptanalysis and Meet-in-the-Middle Attack on ARIA,TN918.1
  14. Cryptanalysis of Block Cipher Clefia and Macs Based on Four Rounds AES,TP309.7
  15. Techniques for Cryptanalysis of Block Ciphers,TN918.1
  16. On the Theory and Some Key Techniques of Block Ciphers,TN918.1
  17. Cryptanalysis of Two Symmetric Encryption Algorithms ARIA and SALSA20,TN918.1
  18. On the Design and Security Analysis of Block Ciphers,TN918.1
  19. Study on the Security of Mobile Communication,TN929.5
  20. Security technology of the third generation mobile communication system,TN929.5

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Mobile Communications > Cellular mobile communications systems (mobile phones, mobile phone handsets )
© 2012 www.DissertationTopic.Net  Mobile