CN103430478B - 用于在无线通信系统中加密短数据的方法和设备 - Google Patents

用于在无线通信系统中加密短数据的方法和设备 Download PDF

Info

Publication number
CN103430478B
CN103430478B CN201280012112.8A CN201280012112A CN103430478B CN 103430478 B CN103430478 B CN 103430478B CN 201280012112 A CN201280012112 A CN 201280012112A CN 103430478 B CN103430478 B CN 103430478B
Authority
CN
China
Prior art keywords
cmac
tek
short data
message
rng
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201280012112.8A
Other languages
English (en)
Chinese (zh)
Other versions
CN103430478A (zh
Inventor
白令教
姜贤贞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Publication of CN103430478A publication Critical patent/CN103430478A/zh
Application granted granted Critical
Publication of CN103430478B publication Critical patent/CN103430478B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
CN201280012112.8A 2011-01-10 2012-01-10 用于在无线通信系统中加密短数据的方法和设备 Active CN103430478B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR10-2011-0002474 2011-01-10
KR20110002474 2011-01-10
PCT/KR2012/000236 WO2012096496A2 (en) 2011-01-10 2012-01-10 Method and apparatus for encrypting short data in a wireless communication system

Publications (2)

Publication Number Publication Date
CN103430478A CN103430478A (zh) 2013-12-04
CN103430478B true CN103430478B (zh) 2016-08-24

Family

ID=46455260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280012112.8A Active CN103430478B (zh) 2011-01-10 2012-01-10 用于在无线通信系统中加密短数据的方法和设备

Country Status (5)

Country Link
US (2) US8625798B2 (enExample)
JP (1) JP5855127B2 (enExample)
KR (1) KR101916034B1 (enExample)
CN (1) CN103430478B (enExample)
WO (1) WO2012096496A2 (enExample)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10298386B1 (en) * 2009-06-26 2019-05-21 Marvell International Ltd. Method and apparatus for secure communications in networks
US8625798B2 (en) * 2011-01-10 2014-01-07 Samsung Electronics Co., Ltd. Method and apparatus for encrypting short data in a wireless communication system
US9209886B2 (en) * 2012-01-10 2015-12-08 Electronics And Telecommunications Research Institute Terminal and communication method thereof
US9942210B2 (en) * 2012-05-23 2018-04-10 Nokia Technologies Oy Key derivation method and apparatus for local access under control of a cellular network
US9497142B2 (en) 2012-11-30 2016-11-15 T-Mobile Usa, Inc. Triggering actions on a computing device
US9398448B2 (en) * 2012-12-14 2016-07-19 Intel Corporation Enhanced wireless communication security
US10671546B2 (en) 2015-09-30 2020-06-02 Hewlett Packard Enterprise Development Lp Cryptographic-based initialization of memory content
DE102017204184A1 (de) * 2017-03-14 2018-09-20 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Authentisierte Bestätigungs- und Aktivierungsnachricht
WO2018214052A1 (en) * 2017-05-24 2018-11-29 Qualcomm Incorporated Uplink small data transmission in inactive state
WO2019067056A1 (en) * 2017-09-28 2019-04-04 Apple Inc. METHODS AND ARCHITECTURES OF SECURE TELEMETRY
CN110130703A (zh) * 2018-02-08 2019-08-16 郑州大学 智能立体车库模拟系统
SG10201906806XA (en) * 2019-07-23 2021-02-25 Mastercard International Inc Methods and computing devices for auto-submission of user authentication credential
CN116249105A (zh) * 2021-12-07 2023-06-09 中国移动通信有限公司研究院 密钥更新方法及装置
US20240235823A1 (en) * 2023-01-05 2024-07-11 Qualcomm Incorporated Broadcast and/or groupcast security for device-to-device positioning
CN116389138B (zh) * 2023-04-07 2023-11-24 深圳市众志天成科技有限公司 一种基于数据传输时的信息安全保护方法及装置

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101203025A (zh) * 2006-12-15 2008-06-18 上海晨兴电子科技有限公司 安全的移动信息发送和接收方法

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030023117A (ko) * 2001-09-12 2003-03-19 에스케이 텔레콤주식회사 공개키 기반의 무선단문메시지 보안 및 인증방법
US7991158B2 (en) * 2006-12-13 2011-08-02 Tyfone, Inc. Secure messaging
WO2009132599A1 (en) * 2008-04-30 2009-11-05 Mediatek Inc. Method for deriving traffic encryption key
US8666077B2 (en) * 2008-05-07 2014-03-04 Alcatel Lucent Traffic encryption key generation in a wireless communication network
KR20090126166A (ko) * 2008-06-03 2009-12-08 엘지전자 주식회사 트래픽 암호화 키 생성 방법 및 갱신 방법
US8543091B2 (en) * 2008-06-06 2013-09-24 Ebay Inc. Secure short message service (SMS) communications
WO2009150750A1 (ja) * 2008-06-13 2009-12-17 富士通株式会社 ゲートウェイ装置、無線送信制御方法及び無線通信システム
US8094635B2 (en) * 2008-09-17 2012-01-10 Qualcomm Incorporated Method and apparatus for implementing Short Message Service in wireless communication networks
US8707045B2 (en) * 2009-02-12 2014-04-22 Lg Electronics Inc. Method and apparatus for traffic count key management and key count management
KR20100109998A (ko) * 2009-04-02 2010-10-12 삼성전자주식회사 무선통신시스템에서 핸드오버 레인징 메시지의 인증 처리 장치 및 방법
US20110302416A1 (en) * 2010-03-15 2011-12-08 Bigband Networks Inc. Method and system for secured communication in a non-ctms environment
US8625798B2 (en) * 2011-01-10 2014-01-07 Samsung Electronics Co., Ltd. Method and apparatus for encrypting short data in a wireless communication system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101203025A (zh) * 2006-12-15 2008-06-18 上海晨兴电子科技有限公司 安全的移动信息发送和接收方法

Also Published As

Publication number Publication date
US9088890B2 (en) 2015-07-21
JP2014508436A (ja) 2014-04-03
US8625798B2 (en) 2014-01-07
JP5855127B2 (ja) 2016-02-09
WO2012096496A3 (en) 2012-12-06
US20120177199A1 (en) 2012-07-12
KR20120081036A (ko) 2012-07-18
CN103430478A (zh) 2013-12-04
WO2012096496A2 (en) 2012-07-19
US20140126721A1 (en) 2014-05-08
KR101916034B1 (ko) 2018-11-08

Similar Documents

Publication Publication Date Title
CN103430478B (zh) 用于在无线通信系统中加密短数据的方法和设备
US11122428B2 (en) Transmission data protection system, method, and apparatus
CN113630773B (zh) 安全实现方法、设备以及系统
CN102100030B (zh) 加密控制信号的方法
CN101512537B (zh) 在自组无线网络中安全处理认证密钥资料的方法和系统
ES2734989T3 (es) Comunicaciones seguras para dispositivos informáticos que utilizan servicios de proximidad
CN101500229B (zh) 建立安全关联的方法和通信网络系统
US8560848B2 (en) Galois/counter mode encryption in a wireless network
US11228908B2 (en) Data transmission method and related device and system
CN102036230B (zh) 本地路由业务的实现方法、基站及系统
JP2011530260A (ja) 選択的な制御信号暗号化方法
JP2014508436A5 (enExample)
WO2014090130A1 (zh) 报文处理方法及装置、系统
CN115567922A (zh) 使用单独的计数为多个nas连接提供安全性的方法以及相关的网络节点和无线终端
CN1323523C (zh) 一种在无线局域网中生成动态密钥的方法
WO2022237561A1 (zh) 一种通信方法及装置
EP3563549B1 (en) Encrypting data in a pre-associated state
JP2011045064A (ja) 無線通信システムにおけるデータの完全性検査のためのオーバーヘッドを低減させるための方法及び装置
WO2022134089A1 (zh) 一种安全上下文生成方法、装置及计算机可读存储介质
WO2012112124A1 (en) Communication terminal and method for performing communication
CN119865808A (zh) 一种无线通信方法、无线通信设备、介质及程序产品
CN101646173A (zh) 终端私密性的保护方法及装置

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant