Method for deriving traffic encryption key

作者: Lin Yi Wu , Chi Chen Lee , I Kang Fu

DOI:

关键词:

摘要: A mobile station is provided. The includes one or more radio transceiver module and a processor. processor performs handover negotiation procedure with serving base so as to communication services target by transm itting r eceiving plurality of messages via the m odule, generates an Authorization Key (AK) context derives at least Traffic Encryption (TEK) for station. AK keys shared encrypting be transmitted station, TEK secret key traffic data.

参考文章(21)
Mitsuhiro Matsuo, Nobuyuki Saito, Tomonori Kumagai, Encryption/decryption device, communication controller, and electronic instrument ,(2006)
Dan Forsberg, Secure session keys context ,(2006)
Semyon B Mizikovsky, Robert John Rance, Method of cryptographic synchronization ,(2007)
Jari Arkko, Mats Naslund, Karl Norrman, Elisabetta Carrara, Fredrik Lindholm, MIKEY: Multimedia Internet KEYing RFC. ,vol. 3830, pp. 1- 66 ,(2004)
B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2.0 RFC. ,vol. 2898, pp. 1- 34 ,(2000)
Seok-Heon Cho, Chul-Sik Yoon, Sung-Cheol Chang, The efficient generation method of authorization key for mobile communication ,(2007)
Tae-Shik Shon, Kang-Young Moon, Sun-gi Kim, Sun-Woong Choi, Performing handover using mutual authentication in wireless broadband (WiBro) network ,(2007)