Araştırma Makalesi

3G MOBİL HABERLEŞME İÇERİSİNDE KULLANILAN ŞİFRELEME ALGORİTMALARININ GÜCÜNÜN KARŞILAŞTIRILMASI

Cilt: 17 Sayı: 1 1 Haziran 2016
PDF İndir
EN TR

COMPARISON OF ENCRYPTION ALGORITHMS STRENGTH USED IN 3G MOBILE COMMUNICATION

Abstract

In this study, the strength of data encryption algorithms used in UMTS and CDMA2000 systems which are 3G mobile communication technologies were analyzed. At the beginning of the study, software applications were developed for KASUMI encryption algorithm which is used within UMTS system and AES encryption algo-rithm which is used within CDMA2000 system. Both key generation algorithms are applied to the same key values to create new key values which are used for data encryption. These new key values are tested by using test package of NIST to in order to check whether these key values are generated randomly or not. One of the key value which has high randomness is used as encryption key As a result, it was observed that AES algo-rithm is more successful than 
KASUMI algorithm in generating key values. Additionally, a key value, which has high randomization, was chosen and this key value was applied on encryption algorithm with plain text statement and as a result appli-cation of encrypted text on NIST test, it was observed that both KASUMI and AES block encryption algo-rithms have equally power in 3G mobile technology.
* This paper is based on a Ph.D study titled “The Structure of Mobile Communication Technologies and Anal-ysis of the Reliability of Data Encryption Algorithms Used in These Technologies”

Keywords

Security,Mobile communication,KASUMI,AES,NIST tests

Kaynakça

  1. 3GPP Task Force. Document 2: KASUMI specification: 3GPP confidentiality and Integrity Algorithms, 1999. ADVANCED ENCRYPTİON STANDARD (AES), Federal Information Processing Standards Publication 197, November 26, 2001.
  2. AKLEYLEK, S. On The Avalanche Properties of Misty1, Kasumi and Kasumi-R. A Thesis Submitted To The Graduate School of Applied Mathematics of Middle East Technical University, 2008.
  3. AKYILDIZ, E., DOĞANAKSOY, A., KEYMAN, E. ve UĞUZ, M. Kriptolojiye Giriş Ders Notları. Uygulamalı Matematik Enstitüsü, Kriptografi Bölümü, ODTÜ, TÜRKİYE, 115-120, 2004.
  4. BABBAGE, S. Design of Security Algorithms for Third Generation Mobile Telephony, Vodafone Ltd, Information Security Technical Report, 5(3), 66-73, 2000.
  5. BALANI, A. Authentication and Encryption in CDMA Systems. Head-India Carrier Support Group, LG Soft India Private Limited, 2007.
  6. BASSHAM, L, E. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, Computer Security, April 2010.
  7. BIHAM, E., DUNKELMAN, O. and KELLER, N. Related-Key Impossible Differential Attacks on 8-Round AES-192. CT-RSA 2006, LNCS 3860, pp. 21-33, 2006.
  8. BIHAM, E., DUNKELMAN, O. and KELLER, N. Related-Key Rectangle Attack on the Full KASUMI. Asiacrypt 2005, LNCS 3788, pp. 443-461, 2005.
  9. BLANCHARD, C. Security for the Third Generation (3G) Mobile System, Information Security Technical Report, 5(3), pp.55-65, 2000.
  10. BLUNDEN, M. and ESCOTT, A. Related Key Attacks on Reduced Round. LNCS, Vol.2355, 277-285, 2002. CHEN H. H. and GUIZANI M. Next Generation Wireless Systems and Networks, John Wiley & Sons, ISBN- 13 978 -0-470-02434-8 (HB), 2006.

Kaynak Göster

IEEE
[1]F. Akgün ve E. Buluş, “3G MOBİL HABERLEŞME İÇERİSİNDE KULLANILAN ŞİFRELEME ALGORİTMALARININ GÜCÜNÜN KARŞILAŞTIRILMASI”, TUJES, c. 17, sy 1, ss. 1–11, Haz. 2016, [çevrimiçi]. Erişim adresi: https://izlik.org/JA79UW32XH