作者: Jari Juopperi
DOI:
关键词:
摘要: In known telecommunications systems using multiple access the terminal equipment assumes that network element is genuine while genuine. This allows false equipment, a or third party to penetrate system. The proposed commitment protocol applies bit block from cryptography and shared encryption key authentication divided into two parts, whereby one part of it done by other network. (MS) sends (BTS) pseudo identifier (AMSI) which has formed, whereupon keys (MKEY, BKEY) are exchanged. Only when revealed its true identity, will send required information (IMSI, RND1, RND2) encrypted with combination keys. Finally, authenticates identity revealed. then can operation commence.