关键词:AKA ;f1-f5 ;Rijndael
the UE Implement of F1 to F5 for 3G AKA Protocol
Abstract
Along with mobile communication system unceasing development, the third generation mobile communication system(3G) becomes the hot spot in the current mobile communication domain. In the 3G system, many new data services will open. Increases which while the service, the system safety question will become more and more important.
The AKA protocol is a security protocol in the 3G system. It including seven algorithm: f1-f5, f1* and f5*. This design only involves f1-f5 on the user's equipment (UE) implement. This design is based on the AES encryption algorithm. So, in this article, contains two sides:f1-f5 and AES.
Because we design for the user's equipment terminal, it involves a question about whether the system hardware resources sufficient. So, this design uses 8 bit AES encryption algorithm.