Implementation of Authentication Algorithm for CDMA Digital Mobile Communication System

CDMA 디지털 이동통신 시스템의 인증 알고리즘 구현

  • Kim, Bum-Sik (Dept. of Electronics and Computer Eng., Dankook Univ.) ;
  • Shin, In-Chul (Dept. of Electronics and Computer Eng., Dankook Univ.)
  • 김범식 (단국대학교 전자.컴퓨터공학과) ;
  • 신인철 (단국대학교 전자.컴퓨터공학과)
  • Published : 1999.12.01

Abstract

The user authentication service can be used to prevent telecommunications piracy and to demand reliable payment from subscriber. Over the last few years several of the cryptographic systems being used by the IS-41 North American Mobile telephones have been broken. These algorithms included ORYX, CMEA and CAVE. The process of replacing these algorithms is already underway. In this paper we designed a hash function and applied it to the authentication algorithm of IS-95A authentication system. We also analyzed the randomness properties of designed algorithm using statistical analysis and simulated the validity of this algorithm using C programming language.

이동통신에서의 사용자 인증 서비스는 통화도용 방지와 신뢰성 있는 과금을 위한 중요한 보호서비스이다. 최근 몇 년 동안 IS-41 북미 이동 전화 시스템에서 사용되어지는 몇몇 암호 시스템이 공격을 당하였다. 이러한 알고리즘은 ORYX, CMEA 그리고 CAVE 등이다. 이러한 알고리즘들을 대체하기 위한 작업이 이미 진행 중이다. 본 논문에서는 해쉬함수를 개발하고 이를 IS-95A 시스템의 인증 알고리즘에 적용하였다. 그리고 통계적 분석 기법을 사용하여 개발된 알고리즘의 출력 특성을 분석하였으며 C 프로그래밍 언어를 사용하여 알고리즘의 유효성을 시뮬레이션하였다.

Keywords

References

  1. ISO/lEC 7498-2, Information Processing-OSI Basic Reference Model - Part2 : Security Architecture
  2. TIA/EIA IS-95A, Mobile-Base Station Compatibility Standard for Dual-Mode Wideband Spread Spectrum Cellular System
  3. European Digital Cellular Telecommunication System(phase 2)-Security Related Network Functions ETSI
  4. Personal Communications Services PACS Air Interface Specification JTC
  5. workshop on Selected Areas in Cryptology 1998, Proceedings Cryptanalysis of ORYX Wagner, D.;Simpson, L.;Dawson, E.;Kelsey, J.;Millan, W.;Shneier, B.
  6. Advances in Cryptology - Crypto'97 Proceedings;Lecture Notes in Computer Science v.1294 Cryptanalysis of the Cellular Message Encryption Algorithm Wagner, D.;Shneier, B.;Kelsey, J.
  7. 1st International Conference on Information Security and Cryptology, Proceedings Cryptanalysis of the Alleged Cave Algorithm Millan, W.
  8. New security algorithms : Call for development Telecommunications Industry Association
  9. Handbook of Applied Cryptography Menezes, A.J.;van Oorschot, P.C.;Vanstone, S.A.
  10. Analysis and design of cryptographic hash functions Preneel, B.
  11. Advances in Cryptology-Crypto'90;Lecture Notes in Computer Science v.537 The MD4 message-digest algorithm Rivest, R.L.
  12. The MD5 message-digest algorithm;Request For Comment(RFC) 1320 Rivest, R.L.
  13. Secure hash standard;Federal Information Processing Standards Publication 180-1 FIPS 180-1
  14. Fast Software Encryption-Cambridge Workshop;Lecture Notes in Computer Science v.1039 RIPEMD-160 : A strengthened version of RIPEMD Dobbertin, H.;Bosselaers, A.;Prennel, B.
  15. Advances in Cryptology-AUSCRYPT'92, LNCS v.718 Haval - a one-way hashing algorithm with variable length of output Zheng, Y.;Pieprzyk, J.;Sebery, J.
  16. Fast Software Encryption-Cambridge Workshop, Lecture Notes in Computer Science v.1039 Cryptanalysis of MD4 Dobbertin, H.
  17. CryptoBytes v.2 no.2 The status of MD5 after recent attack Dobbertin, H.