3GPP 33102 PDF

Springer Professional. Back to the search result list. Table of Contents. Hint Swipe to navigate through the chapters of this book Close hint.

Author:Dajora Zulkijas
Country:South Africa
Language:English (Spanish)
Genre:Career
Published (Last):16 May 2018
Pages:444
PDF File Size:8.47 Mb
ePub File Size:18.16 Mb
ISBN:833-2-35856-395-7
Downloads:26944
Price:Free* [*Free Regsitration Required]
Uploader:Tekinos



Springer Professional. Back to the search result list. Table of Contents. Hint Swipe to navigate through the chapters of this book Close hint. The proposal is essentially two disjoint phases: an identification phase, followed by an establishment of security context between mobile subscribers and their service providers via symmetric-key based authenticated key agreement. Currently, 3GPP proposes to protect the identification phase with a public-key based solution, and while the current proposal is secure against a classical adversary, the same would not be true of a quantum adversary.

In this paper, we present such an alternative scheme for the problem of private identification protection. Our solution is compatible with the current 5G specifications, depending mostly on cryptographic primitives already specified in 5G, adding minimal performance overhead and requiring minor changes in existing message structures.

Finally, we provide a detailed formal security analysis of our solution in a novel security framework. Please log in to get access to this content Log in Register for free. To get access to this content you need the following product:. Springer Professional "Technik" Online-Abonnement. Springer Professional "Wirtschaft" Online-Abonnement. We follow the 3GPP naming convention.

Users can also be identified through other unique identifiers, for instance International Mobile Equipment Identity IMEI which uniquely identifies the mobile equipment. This first Step is numbered 0 because its not an exclusive part of the AKA but rather the identification phase.

RFC , 1—29 In: Ray, I. ACM Datenschutz und Datensicherheit 26 4 , — Fox, D. Datenschutz und Datensicherheit 26 4 , — In: Miller, G. Accessed 08 June Kelly, J. Accessed 08 June In: Chen, L. SSR LNCS, vol. Springer, Cham In: Noubir, G. The Internet Society Publisher Springer International Publishing.

6ES7 407-0KR02-0AA0 PDF

Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks

Specification : General Versions Responsibility Related. Reference: No Remarks Added. Action date Action Author.

ANTIGUOS Y MODERNOS MARAVALL PDF

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

.

Related Articles