WO2003050988A1 - Procede de selection d'une arithmetique de cryptage pour realiser une communication confidentielle - Google Patents

Procede de selection d'une arithmetique de cryptage pour realiser une communication confidentielle Download PDF

Info

Publication number
WO2003050988A1
WO2003050988A1 PCT/CN2002/000223 CN0200223W WO03050988A1 WO 2003050988 A1 WO2003050988 A1 WO 2003050988A1 CN 0200223 W CN0200223 W CN 0200223W WO 03050988 A1 WO03050988 A1 WO 03050988A1
Authority
WO
WIPO (PCT)
Prior art keywords
encryption algorithm
user
communication
rnc
uea
Prior art date
Application number
PCT/CN2002/000223
Other languages
English (en)
French (fr)
Inventor
Zhibin Zheng
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to DE60228613T priority Critical patent/DE60228613D1/de
Priority to US10/498,334 priority patent/US7474751B2/en
Priority to EP02721959A priority patent/EP1455474B1/en
Priority to AU2002252934A priority patent/AU2002252934A1/en
Publication of WO2003050988A1 publication Critical patent/WO2003050988A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to secure communication technology in a 3G system, and in particular to a method for judging and selecting encryption algorithms supported by both a terminal and a network communication party in a communication system, so as to ensure that both parties realize an independent selection of an encryption algorithm for confidential communication.
  • encrypting and protecting information is to use an encryption algorithm on both sides of the communication.
  • the sender encrypts the data to be transmitted according to the selected encryption algorithm and then transmits it.
  • the receiver then decrypts it according to the selected encryption algorithm and analyzes it.
  • 3G WCDMA third-generation wideband code division multiple access
  • UE end user equipment
  • UTRAN access network universal mobile communication system terrestrial wireless access network
  • the encryption algorithms used by both parties are stored in the RNC of the UE and the access network.
  • the RNC actually stores the encryption algorithms supported by the core network (CN).
  • the selection of the encryption algorithm is based on the RNC.
  • the algorithm capabilities supported by the UE are compared with the available algorithm requirements specified by CN. Since each encryption algorithm corresponds to an encryption algorithm identifier (UEA), the selection of the encryption algorithm is determined by the RNC by comparing and judging UEA.
  • UPA encryption algorithm identifier
  • the encryption algorithm identifier is 4 bits. Among them, "0000" is defined as no encryption, and "000 ⁇ ” is defined as the standard KASUMI encryption algorithm. The other 14 values are not defined. They can be used as reserved identifiers.
  • the specific implementation process of the existing encryption protection is as follows: 1) First, a radio resource control (RRC) connection is established. After the connection is successfully established, the UE sends security information to the access network.
  • RRC radio resource control
  • the upper layer of the UE When a user makes a service call or the user is called, the upper layer of the UE will notify the access layer to establish an RRC connection, that is, establish an RRC connection between the UE and a radio network controller (RNC) of the access network.
  • RRC radio network controller
  • the UE sends the security capability information of the UE to the RNC in the access network through the message RRC CONNECTION COMPLETE that successfully established the RRC connection, and the RNC stores the related security information, including the encryption algorithm identifier supported by the UE.
  • the core network initiates the establishment of a security mode.
  • the access register (VLR) in the CN will decide which encryption algorithm identifiers (UEAs) to choose, and send a secret mode command message SECURITY MODE COMMAND to the RNC. This information will carry the UEAs and the encryption key (CK ).
  • the RNC processes the received privacy mode command.
  • the RNC selects the UEA according to the received UEAs indication and the stored UEA indication supported by the UE, and then the RNC sends an information privacy mode command message SECURITY MODE COMMAND to the UE, and the message will carry the selected UEA.
  • the UE After receiving the security mode command, the UE sets the local UE security capability parameter as the received UE security capability parameter, and sends a security mode completion message SECURITY MODE COMPLETE to the RNC of the access network, indicating the security mode. Set up successfully.
  • the access network receives security mode completion information.
  • the R C of the access network After receiving the security mode completion message, the R C of the access network immediately sends a security mode completion message SECURITY MODE COMPLETE to the VLR of the CN. This message carries the selected UEA.
  • the security process is successfully completed.
  • the VLR in the CN completes its own security mode setting, and then waits for the UE and UTRAN to start confidential communication after a specified time, and performs encryption and decryption according to the encryption algorithm corresponding to the selected UEA.
  • the domestic encryption algorithm is preferentially designated; if the two parties do not have the same encryption algorithm to choose from, but the core network requires encrypted communication, the UE cannot perform normal communication.
  • each country or operator can optionally reserve one of the identification values, so that when mobile users roam, encryption algorithm identification is likely to occur Conflict issues. For example: A Chinese operator chooses "0010" as its own algorithm identifier, and another US operator chooses "0010" as its own algorithm identifier. The two encryption algorithm identifiers have the same value, but in fact, the two "0010" Corresponding encryption algorithms are different. Then, when a user served by a Chinese operator roams to the United States and negotiates an encryption algorithm, the same encryption algorithm identification value will cause the two parties to establish a normal connection. As a result, the two parties cannot communicate normally. Summary of the Invention
  • the main object of the present invention is to provide an implementation of an autonomously selected encryption algorithm.
  • the method of confidential communication enables users to use an effective encryption algorithm for normal confidential communication anywhere, and can meet the needs of the user's current location to independently select an encryption algorithm, thereby ensuring the interests of users and the quality of services.
  • a method for autonomously selecting an encryption algorithm to implement confidential communication includes at least the following steps:
  • the core network extracts the mobile country code (MCC) of the user, and then sets the value of the user identification (CI) according to the MCC;
  • the UE a user equipment (UE) and radio resource control (RRC) corresponding to the user, and after the connection is successfully established, the UE sends a successful RRC connection establishment message to the radio network controller (RNC) in the access network,
  • RNC radio network controller
  • the RNC stores the security information related to the encryption algorithm identifier (UEA) supported by the UE;
  • the access register (VLR) in the CN determines the selected at least one encryption algorithm identifier (UEAs), and simultaneously sends to the RNC, including the UEAs, the encryption key (C :), and the confidentiality of the CI information Mode command message
  • the RNC After receiving the privacy mode command message, the RNC first determines the UEA for confidential communication according to the UEAs selected by CN in the message and the UEA supported by the stored UE:
  • the CN supports more than one encryption algorithm
  • the standard encryption algorithm is selected as the encryption algorithm for confidential communication; otherwise, it is considered that there is no A legal encryption algorithm that interrupts the communication connection;
  • the current user is a domestic user and both the UE and the CN support an encryption algorithm whose UEA is not "0001”, this algorithm is selected as the encryption algorithm for confidential communication; otherwise, it is considered that there is no legal Encryption algorithm, interrupting the communication connection;
  • the CN only supports the standard encryption algorithm
  • the standard encryption algorithm is directly selected as the encryption algorithm for confidential communication; otherwise, it is considered that there is no agreement. Encryption algorithm, interrupt the communication connection;
  • the RNC After the UEA is determined, the RNC sends the security mode command with the selected UEA to the UE. E. After receiving the security mode command, the UE sets the local security capability parameter to the received security capability parameter, and simultaneously sends the The RNC of the network sends a security mode completion message. After receiving the message, the RNC immediately sends a security mode completion message with the selected UEA to the VLR of the CN. After receiving the security mode completion message, the VLR completes its own security mode setting.
  • the method further includes: when the current user is judged to be a domestic user by the user MCC code, setting the value of CI to 0; when the current user is judged to be a user in another country by the user MCC code, setting the value of CI to 1.
  • the method may further include: pre-setting and storing an MCC number list at the CN. Those who meet the number list are deemed to be domestic users, and the corresponding CI value is set to 0; those who do not meet the number list are other countries' users, and set the corresponding CI value. Is 1. Among them, it is set to store in the MCC number table the MCC code of a foreign user who uses the same encryption algorithm as the domestic user.
  • the length of the CI can be set to lbit.
  • the key of the present invention is to increase the user identification (CI) bit and increase the judgment of the CI and the encryption algorithm supported by the current user and the network.
  • CI user identification
  • the encryption algorithm or when the user and the network support the same self-developed encryption algorithm other than the standard encryption algorithm, normal confidential communication can be performed; otherwise, the two parties cannot conduct confidential communication.
  • the method for autonomously selecting an encryption algorithm provided by the present invention to achieve secure communication has the following advantages and characteristics:
  • the method of the present invention can not only meet the requirement of adopting a separate encryption algorithm for domestic confidential communication, but also ensure that users can achieve secure communication when roaming by supporting standard encryption algorithms; completely solve the mobile phone users ’roaming due to encryption algorithm identification conflicts Inability to proceed The problem of often confidential communication can provide users with better services.
  • the CN adds a parameter CI to the SECURITY MODE COMMAND message sent by the Iu interface to the RNC, but this parameter occupies very few bits, so it has little impact on the implementation of the device.
  • FIG. 1 is a signaling flowchart for determining an encryption algorithm in the prior art
  • FIG. 2 is a flowchart of a method for determining an encryption algorithm according to the present invention. Mode of Carrying Out the Invention
  • the RNC needs to compare the encryption algorithms supported by the UE with the encryption algorithms supported by the CN to select the encryption algorithm used for communication between the two parties, in order to ensure that encryption algorithm conflicts do not occur during roaming, various possibilities are added during the comparison process. Judging the situation and the corresponding encryption algorithm can be selected. In addition, since it is necessary to know the country or operator of the current user in the determination of various situations, a message identifying the operator or country to which the user belongs is added to the message sent by the CN to the access network. The encryption algorithm supported by the user, RNC can choose the encryption algorithm to be used.
  • the premise of the method of the present invention is that both the UE and the network support standard encryption algorithms, and the network requires encryption, that is, UEA is not "0000".
  • the RNC must judge the domestic and foreign users based on the user identification, and then select a legal encryption algorithm. If the CN supports both the standard encryption algorithm and the encryption algorithm independently developed by the country, it must conduct confidential communications in the country according to the encryption algorithm independently developed.
  • a specific implementation process of the method of the present invention includes at least the following steps:
  • the CN extracts the MCC code of the user to determine whether the user is a domestic user or a foreign user.
  • the upper layer of the UE will notify the access layer to establish an RRC connection, that is, establish an RRC connection between the UE and the RNC.
  • the UE sends the information about its own security capabilities to the RNC through the message RRC CONNECTION COMPLETE that successfully established the RRC connection, and the RNC stores related security information, including the encryption algorithm identifier supported by the UE.
  • the VLR in the CN will decide which encryption algorithm identifiers (UEAs) to choose, and at the same time, send the security mode command message SECURITY MODE COMMAND to the RNC, which will carry UEAs and CK and the newly added CI information.
  • the length of the CI is 1 bit. Of course, the length of the CI may also occupy multiple bits according to the needs of actual applications.
  • the RNC After receiving the privacy mode command message, the RNC first selects the UEA used for the confidential communication according to the received UEAs indication and the UEA indication supported by the stored UE.
  • the selection process includes two cases:
  • the CN supports more than one encryption algorithm, there are two main cases: al.
  • the received CI value is 1, if both the UE and the CN support a standard encryption algorithm identified by "000 ⁇ ", the standard is selected.
  • the encryption algorithm is used as the encryption algorithm for confidential communication; otherwise, it is considered that there is no valid encryption algorithm and the communication connection is interrupted; a2.
  • the received CI value is 0, if both the UE and the CN support an encryption algorithm that is not identified as "0001", then this algorithm is selected as the encryption algorithm used for confidential communication; Encryption algorithm to interrupt the communication connection.
  • the MCC code can be processed at the CN of the core network. For example: An MCC number list is set and stored in the CN in advance, and the number list includes all other countries' MCC codes that use the same encryption algorithm as their own country.
  • the CN only supports standard encryption algorithms, that is, the security mode command message SECURITY MODE COMMAND sent by the CN contains only "000 ⁇ " encryption algorithms, and the UE supports encryption algorithms with "0001" identification, then there is no need to determine the CI.
  • the standard algorithm is used directly as the encryption algorithm used for secure communication.
  • the RNC After the UEA is determined, the RNC sends a secret mode command message SECURITY MODE COMMAND to the UE, and the message carries the selected UEA.
  • the UE After receiving the security mode command, the UE sets the local UE security capability parameter t to the received UE security capability parameter according to the security confidential information in the message, and sends a security mode completion message SECURITY to the RNC of the access network.
  • MODE COMPLETE indicating that the security mode is set successfully.
  • the RNC of the access network After receiving the security mode completion message, the RNC of the access network immediately sends a security mode completion message SEUCIRTY MODE COMPLETE to the VLR of the CN.
  • the message carries the Selected UEA.
  • the VLR in the CN After receiving the security mode completion message, the VLR in the CN completes its own security mode setting, and then waits until the specified time arrives.
  • the UE and UTRAN start confidential communication, and perform encryption and decryption according to the encryption algorithm corresponding to the selected UEA.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Facsimile Transmission Control (AREA)
  • Communication Control (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Computer And Data Communications (AREA)

Description

一种自主选择加密算法实现保密通信的方法
技术领域
本发明涉及 3G***中的保密通信技术, 尤指一种通过对通信*** 中终端和网络通信双方所支持的加密算法进行判断选择, 以保证双方实 现保密通信的自主选择加密算法的方法。 发明背景
目前, 在各种通信***尤其是移动通信***中, 为了确保用户间信 息的安全保密性, 保密通信的实现是非常重要的, 这就需要对所传输的 数据进行加密保护。 通常, 对信息进行加密保护就是在通信双方采用加 密算法, 发送方将要传输的数据按选定的加密算法加密后传输, 接收方 收到后再按选定的加密算法解密后分析使用。
在现有的第三代宽带码分多址(3G WCDMA )移动通信***中, 终 端用户设备 ( UE ) 和接入网 通用移动通信***地面无线接入网 ( UTRAN )之间传输信息时,就可以进行加密保护。该保密通信过程中, 双方所采用的加密算法分别存放于 UE和接入网的 RNC中, RNC中存 储的实际是核心网 (CN ) 所支持的加密算法, 而加密算法的选择是由 RNC根据 UE所支持的算法能力和 CN所指定的可用算法要求进行比较 得到的。 由于每种加密算法对应一个加密算法标识 (UEA ), 因此, 加 密算法的选择是 RNC 通过对 UEA 的比较判别来确定的。 按照目前 WCDMA标准的规定, 加密算法标识为 4bit, 其中, "0000" 定义为不 加密, "000Γ定义为标准的 KASUMI加密算法, 而其它 14个值没有定 义, 作为预留标识可自定义使用。
参见图 1所示, 现有加密保护的具体实现过程是这样的: 1 )首先, 建立无线资源控制 (RRC )连接, 连接成功建立后, UE 将安全信息发送至接入网中。
当用户进行业务呼叫或是用户被呼叫时, UE 的高层将通知接入层 建立 RRC连接, 即: 在 UE和接入网的无线网络控制器(RNC )之间建 立 RRC连接。连接成功建立后, UE通过成功建立 RRC连接的消息 RRC CONNECTION COMPLETE, 将 UE的安全能力信息发送给接入网中的 RNC, RNC存储相关的安全信息,其中包括 UE所支持的加密算法标识。
2 )核心网 (CN )发起建立安全模式。
当 CN发起建立安全模式时, CN中的访问寄存器(VLR )将决定 选用哪些加密算法标识 (UEAs ), 并向 RNC 发送保密模式命令消息 SECURITY MODE COMMAND,该信息将携带 UEAs和加密密钥( CK )。
3 ) RNC对接收到的保密模式命令的处理。
RNC根据接收的 UEAs指示和存储的 UE所支持的 UEA指示, 来 选定 UEA, 继而 RNC向 UE发送信息保密模式命令消息 SECURITY MODE COMMAND, 该消息中将携带选定的 UEA。
4 ) UE接收安全模式命令后的处理。
UE接收到安全模式命令后,设置本地的安全保密能力(UE security capability )参数为所收到的 UE security capability参数, 同时, 向接入网 的 RNC发送安全模式完成消息 SECURITY MODE COMPLETE,表示安 全模式设置成功。
5 )接入网接收安全模式完成信息。
接入网的 R C接收到安全模式完成消息后, 立即向 CN的 VLR发 送安全模式完成消息 SECURITY MODE COMPLETE, 该消息中携带有 选定的 UEA。
6 )安全过程成功完成。 CN中的 VLR接收到安全模式完成消息后, 完成自身的安全模式设 置, 然后等待, 等到达指定时间后 UE和 UTRAN开始保密通信, 按照 选定 UEA所对应的加密算法进行加解密。
由于密码应用的特殊性, 出于对自己国家或自己网络信息安全性和 保密性考虑, 不同国家或运营商更希望使用自己单独的加密算法, 以防 止密钥易于被破解而造成不可预测的损失, 如此, 需要单独加密算法的 国家或运营商除了支持标准的加密算法以外, 还可以选择 14 个预留加 密算法标识之一, 作为自己独立的、 自主开发的加密算法对应的标识, 那么, ***就可能支持两种加密算法。 在通信过程中, 如果存在多个加 密算法可选,则运营商会优先指定更适合当前情况的加密算法,比如说: 同一国家内的两个用户, 双方都支持标准加密算法和本国加密算法, 则 在国内通信会优先指定本国加密算法; 如果双方没有相同的加密算法可 选, 但核心网络要求必须进行加密通信时, UE则不能进行正常的通信。
但是, 由于目前对于预留加密算法标识值的选用没有统一的规定, 每个国家或运营商都可以任选预留标识值的其中之一, 这样在移动用户 漫游时, 就很可能发生加密算法标识沖突的问题。 比如: 中国运营商选 用 "0010" 作为本国的算法标识, 而另一个美国运营商也选用 "0010" 作为本国的算法标识, 两个加密算法标识的值相同, 但实际上这两个 "0010" 对应的加密算法是不同的, 那么, 当中国运营商服务的用户到 美国漫游, 协商加密算法时, 由于加密算法标识值相同, 会使双方建立 正常的连接, 但由于加密算法的不同, 又会导致双方不能进行正常的通 信。 发明内容
有鉴于此, 本发明的主要目的在于提供一种自主选择加密算法实现 保密通信的方法, 使得用户在任何地方均可采用有效的加密算法进行正 常的保密通信, 并能满足用户当前所在地自主选择加密算法的需求, 进 而保证用户的利益和服务的质量。
为达到上述目的, 本发明的技术方案具体是这样实现的:
一种自主选择加密算法实现保密通信的方法, 该方法至少包括以下 的步骤:
a. 当用户进行呼叫或被呼叫时, 核心网 (CN )提取该用户的移动国 家码(MCC ), 进而根据 MCC设定用户标识(CI ) 的值;
b. 在该用户对应的用户设备(UE )和无线资源控制(RRC )之间建 立连接, 连接建立成功后, UE向接入网中的无线网络控制器(RNC )发 送成功建立 RRC连接消息, RNC存储该消息中包括 UE所支持的加密算 法标识 (UEA ) 的相关安全信息;
c 当 CN发起安全模式建立过程时, CN中的访问寄存器( VLR )决 定所选用的至少一个加密算法标识 (UEAs ), 同时向 RNC 发送包括 UEAs、 加密密钥 (C :)、 CI信息的保密模式命令消息;
d. RNC收到保密模式命令消息后, 先根据消息中 CN选用的 UEAs 和存储的 UE所支持的 UEA来确定保密通信的 UEA:
当 CN支持一种以上加密算法时,如果当前用户为他国用户且 UE和 CN都支持 UEA为 "0001" 的标准加密算法, 则选定该标准加密算法作 为保密通信的加密算法; 否则, 认为没有合法的加密算法, 中断通信连 接; 如果当前用户为本国用户且 UE和 CN都支持 UEA不为 "0001" 的 一种加密算法, 则选用该算法作为保密通信的加密算法; 否则, 认为没 有合法的加密算法, 中断通信连接;
当 CN只支持标准加密算法时,如果 UE也支持该标准加密算法, 则 直接选定该标准加密算法作为保密通信的加密算法; 否则, 认为没有合 法的加密算法, 中断通信连接;
UEA确定后, RNC向 UE发送携带有选定 UEA的保密模式命令消 e. UE收到安全模式命令后,设置本地的安全保密能力参数为所收到 的安全保密能力参数,同时,向接入网的 RNC发安全模式完成消息, RNC 收到该消息后, 立即向 CN的 VLR发送带有选定 UEA的安全模式完成 消息; VLR收到安全模式完成消息后, 完成自身的安全模式设置。
该方法进一步包括: 当通过用户 MCC码判断当前用户为本国用户 时, 设置 CI的值为 0; 当通过用户 MCC码判断当前用户为他国用户时, 设置 CI的值为 1。
该方法也可进一步包括:在 CN处预先设置并存储一个 MCC号码表, 符合号码表的视为本国用户, 设置相应的 CI值为 0; 不符合号码表的为 他国用户, 设置相应的 CI值为 1。 其中, 设定在 MCC号码表中存储与 本国用户采用完全相同加密算法的外国用户的 MCC码。
可设定 CI的长度为 lbit。
由上述方案可以看出, 本发明的关键在于: 增加用户标识(CI ) 比 特, 并增加对该 CI和当前用户及网络所支持的加密算法的判断, 当为国 外用户且用户和网络都支持标准加密算法时, 或为国内用户且用户和网 络均支持标准加密算法以外的同一种自主开发的加密算法时, 可进行正 常的保密通信; 否则, 双方不能进行保密通信。
因此, 本发明所提供的自主选择加密算法实现保密通信的方法, 具 有以下的优点和特点:
1 )本发明的方法不仅能够满足国内保密通信时采用单独加密算法的 需求, 又能保 用户通过支持标准的加密算法实现漫游时的保密通信; 彻底解决了移动用户漫游时, 由于加密算法标识沖突引起的不能进行正 常保密通信的问题, 进而可为用户提供更好的服务。
2 ) 虽然增加了 CN对 UE移动国家码(MCC )的解析步骤, 但由于 CN原来就必须解析 UE的 MCC码, 因此不会增加额外的运行开销。
3 ) CN在 Iu接口向 RNC所发的 SECURITY MODE COMMAND消 息中增加了参数 CI, 但该参数占用比特极少, 因而对设备的实现影响极 小。
4 )在 RNC中增加了对接收 Iu接口的 SECURITY MODE COMMAND 命令后的额外选择判断, 但该判断设计简单, 易于实现, 而且也不会影 响只采用标准算法作为加密算法时的运营***应用。 附图简要说明
图 1为现有技术中确定加密算法的信令流程图;
图 2为本发明确定加密算法的实现方法流程图。 实施本发明的方式
下面结合附图对本发明进行详细描述。
由于 RNC要对 UE支持的加密算法和 CN支持的加密算法进行比较, 以选定双方通信所用的加密算法, 因此, 为了保证漫游时不发生加密算 法沖突, 在比较过程中, 加入对各种可能出现情况的判定及相应的加密 算法选择即可。 又由于在各种情况的判定中需要了解当前用户的所属国 家或运营商, 所以要在 CN发往接入网的消息中, 增加一个判断用户所 属运营商或国家的标识, 居该标识及当前用户支持的加密算法, RNC 便可选定要采用的加密算法。
本发明方法实现的前提为 UE和网络均支持标准加密算法, 且网络 要求必须加密, 即: UEA不为 "0000"。 另外, 如果有本国算法的要求, RNC必须根据用户标识, 判断是国内国外用户, 进而选择合法的加密算 法, 且如果 CN 同时支持标准加密算法和本国自主开发的加密算法时, 必须按自主开发的加密算法在国内进行保密通信。
参见图 2所示, 本发明方法的具体实现过程至少包括以下的步骤:
1 ) 当用户进行呼叫或被呼叫时, CN提取出该用户的 MCC码, 进 而判断该用户是本国用户还是国外用户。
2 )对于该进行呼叫或被呼叫的用户, UE的高层将通知接入层建立 RRC连接, 即: 在 UE和 RNC之间建立 RRC连接。 当连接建立成功后, UE通过成功建立 RRC连接的消息 RRC CONNECTION COMPLETE,将 自身安全能力的信息发送给 RNC, RNC存储相关安全信息, 其中包括 UE所支持的加密算法标识。
3 ) 当 CN发起安全模式建立过程时, CN中的 VLR将决定选用哪些 加密算法标识( UEAs ), 同时向 RNC发送保密模式命令消息 SECURITY MODE COMMAND , 该消息中将携带 UEAs和 CK以及新增的 CI信息, 本实施例中该 CI的长度为 lbit, 当然, 该 CI的长度也可以根据实际应 用的需要占用多个比特。 当通过用户 MCC码判断当前用户为本国用户 时, CI置为 0; 当通过用户 MCC码判断当前用户为他国用户时, CI置 为 1。
4 ) RNC收到保密模式命令消息后,先根据接收的 UEAs指示和存储 的 UE所支持的 UEA指示, 来选定保密通信所用的 UEA。该选定过程包 括两种情况:
a. 如杲 CN支持一种以上加密算法, 则主要分为两种情况: al. 当接收的 CI值为 1时, 如果 UE和 CN都支持 "000Γ 标识的 标准加密算法, 则选定该标准加密算法作为保密通信所用的加密算法; 否则, 认为没有合法的加密算法, 中断通信连接; a2. 当接收的 CI值为 0时, 如果 UE和 CN都支持不为 "0001" 标 识的一种加密算法, 则选用该算法作为保密通信所用的加密算法; 否贝 'J , 认为没有合法的加密算法, 中断通信连接。
在 al的情况下, 如果当前用户是他国用户, 但该用户的所属国或所 属运营商采用与漫游地完全相同的加密算法进行保密通信, 比如说: 中 国用 "0011" 标识对应的加密算法, M 国是中国的近邻, 为省去自主开 发算法的麻烦, 也直接选用中国所用的加密算法, 那么, M 国用户到中 国漫游时, 应该可以正常保密通信, 而按 al的情况又不支持其通信。 为 避免上述情况发生, 可以在核心网 CN处对 MCC码进行处理, 例如: 在 CN处预先设置并存储一个 MCC号码表, 该号码表中包括所有采用与本 国相同加密算法的他国 MCC码。 设置 CI值时, 先查找 MCC号码表, 符合号码表的均视为国内用户, 设置其对应的 CI值为 0; 不符合号码表 的视为国外用户, 设置其对应的 CI值为 1。
b. 如果 CN只支持标准加密算法, 即: CN发送的保密模式命令消息 SECURITY MODE COMMAND中只包含 "000Γ —种标识的加密算法, 且 UE支持 "0001" 标识的加密算法, 则不需判别 CI的值, 而直接采用 标准算法作为保密通信所用的加密算法。
当 UEA确定后, RNC向 UE发送保密模式命令消息 SECURITY MODE COMMAND, 该消息中携带有选定的 UEA。
5 ) UE接收到安全模式命令后, 根据消息中的安全保密信息设置本 地的 UE security capability参凄 t为所收到的 UE security capability参数, 同时, 向接入网的 RNC 发送安全模式完成消息 SECURITY MODE COMPLETE, 表示安全模式设置成功。
6 )接入网的 RNC接收到安全模式完成消息后, 立即向 CN的 VLR 发送安全模式完成消息 SEUCIRTY MODE COMPLETE,该消息中携带有 选定的 UEA。
7 ) CN中的 VLR接收到安全模式完成消息后, 完成自身的安全模式 设置, 然后等待, 等到达指定时间后 UE和 UTRAN开始保密通信, 并按 照选定 UEA所对应的加密算法进行加解密。

Claims

权利要求书
1、 一种自主选择加密算法实现保密通信的方法, 其特征在于该方法 至少包括以下的步骤:
a. 当用户进行呼叫或被呼叫时, 核心网(CN )提取该用户的移动国 家码 (MCC ), 并根据 MCC码设定用户标识(CI )值;
b. 在该用户对应的用户设备(UE )和无线资源控制(RRC )之间建 立连接, 连接建立成功后, UE向接入网中的无线网络控制器(RNC )发 送成功建立 RRC连接消息, RNC存储该消息中包括 UE所支持的加密算 法标识 (UEA ) 的相关安全信息;
c 当 CN发起安全模式建立过程时, CN中的访问寄存器( VLR )决 定所选用的至少一个加密算法标识 (UEAs ), 同时向 RNC发送包括 UEAs、 加密密钥 (CK )、 CI信息的保密模式命令消息;
d. RNC收到保密模式命令消息后, 先根据消息中 CN选用的 UEAs 和存储的 UE所支持的 UEA来确定保密通信的 UEA:
当 CN支持一种以上加密算法时,如果当前用户为他国用户且 UE和 CN都支持 UEA为 "000Γ 的标准加密算法, 则选定该标准加密算法作 为保密通信的加密算法; 否则, 认为没有合法的加密算法, 中断通信连 接; 如果当前用户为本国用户且 UE和 CN都支持 UEA不为 "0001" 的 一种加密算法, 则选用该算法作为保密通信的加密算法; 否则, 认为没 有合法的加密算法, 中断通信连接;
当 CN只支持标准加密算法时,如果 UE也支持该标准加密算法, 则 直接选定该标准加密算法作为保密通信的加密算法; 否则, 认为没有合 法的加密算法, 中断通信连接;
UEA确定后, RNC向 UE发送携带有选定 UEA的保密模式命令消 e. UE收到安全模式命令后,设置本地的安全保密能力参数为所收到 的安全保密能力参数,同时,向接入网的 RNC发安全模式完成消息, RNC 收到该消息后, 立即向 CN的 VLR发送带有选定 UEA的安全模式完成 消息; VLR收到安全模式完成消息后, 完成自身的安全模式设置。
2、 根据权利要求 1所述的方法, 其特征在于该方法进一步包括: 当 通过用户 MCC码判断当前用户为本国用户时, 设置 CI的值为 0; 当通 过用户 MCC码判断当前用户为他国用户时, 设置 CI的值为 1。
3、 根据权利要求 1所述的方法, 其特征在于该方法进一步包括: 在 CN处预先设置并存储一个 MCC号码表, 符合号码表的为本国用户, 设 置相应的 CI值为 0;不符合号码表的为他国用户,设置相应的 CI值为 1。
4、 根据权利要求 3所述的方法, 其特征在于: 设定在 MCC号码表 中存储与本国用户采用完全相同加密算法的外国用户的 MCC码。
5、 根据权利要求 1、 2或 3所述的方法, 其特征在于: 设定 CI的长 度为 lbit。
PCT/CN2002/000223 2001-12-13 2002-03-29 Procede de selection d'une arithmetique de cryptage pour realiser une communication confidentielle WO2003050988A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
DE60228613T DE60228613D1 (de) 2001-12-13 2002-03-29 Verfahren zur auswahl von verschlüsselungsarithmetik zur realisierung der übermittlung von vertraulichkeit
US10/498,334 US7474751B2 (en) 2001-12-13 2002-03-29 Method of selecting encrypting arithmetric for realizing communication of secrecy
EP02721959A EP1455474B1 (en) 2001-12-13 2002-03-29 A method of selecting encrypting arithmetic for realizing communication of secrecy
AU2002252934A AU2002252934A1 (en) 2001-12-13 2002-03-29 A method of selecting encrypting arithmetic for realizing communication of secrecy

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB011442255A CN1172469C (zh) 2001-12-13 2001-12-13 一种自主选择加密算法实现保密通信的方法
CN01144225.5 2001-12-13

Publications (1)

Publication Number Publication Date
WO2003050988A1 true WO2003050988A1 (fr) 2003-06-19

Family

ID=4677400

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2002/000223 WO2003050988A1 (fr) 2001-12-13 2002-03-29 Procede de selection d'une arithmetique de cryptage pour realiser une communication confidentielle

Country Status (7)

Country Link
US (1) US7474751B2 (zh)
EP (1) EP1455474B1 (zh)
CN (1) CN1172469C (zh)
AT (1) ATE406720T1 (zh)
AU (1) AU2002252934A1 (zh)
DE (1) DE60228613D1 (zh)
WO (1) WO2003050988A1 (zh)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1332569C (zh) * 2004-04-23 2007-08-15 中兴通讯股份有限公司 协商选择空中接口加密算法的方法
CN1697353B (zh) * 2004-05-12 2010-04-21 北京信威通信技术股份有限公司 一种适用于个人无线通信***的加密及加密通讯方法
CN100355314C (zh) * 2004-06-28 2007-12-12 华为技术有限公司 一种应用通用鉴权框架的方法
CN100370874C (zh) * 2004-07-16 2008-02-20 华为技术有限公司 一种解决无线资源控制过程配置失败的方法
US8127136B2 (en) * 2004-08-25 2012-02-28 Samsung Electronics Co., Ltd Method for security association negotiation with extensible authentication protocol in wireless portable internet system
CN100579274C (zh) * 2004-11-09 2010-01-06 华为技术有限公司 安全密钥的设置方法
CN101064719A (zh) * 2006-04-27 2007-10-31 华为技术有限公司 Pon***中加密算法协商方法
JP4847246B2 (ja) * 2006-07-31 2011-12-28 キヤノン株式会社 通信装置、通信装置の制御方法、及び当該制御方法をコンピュータに実行させるためのコンピュータプログラム
US8347090B2 (en) * 2006-10-16 2013-01-01 Nokia Corporation Encryption of identifiers in a communication system
KR100821183B1 (ko) 2006-10-31 2008-04-14 주식회사 케이티프리텔 무선 망 제어국에서의 보안 모드 제어 방법 및 장치
WO2008054320A2 (en) 2006-11-01 2008-05-08 Telefonaktiebolaget Lm Ericsson (Publ) Telecommunication systems and encryption of control messages in such systems
GB2446199A (en) 2006-12-01 2008-08-06 David Irvine Secure, decentralised and anonymous peer-to-peer network
CN101272621B (zh) * 2007-03-19 2014-05-21 华为技术有限公司 用户设备能力信息传输方法
CN101399767B (zh) * 2007-09-29 2011-04-20 华为技术有限公司 终端移动时安全能力协商的方法、***及装置
CN101459510B (zh) * 2007-12-14 2012-06-27 成都市华为赛门铁克科技有限公司 实时传输数据的加密算法的实现方法及装置
CN101325483B (zh) * 2008-07-28 2011-06-15 中国电信股份有限公司 对称密钥更新方法和对称密钥更新装置
CN101478752B (zh) * 2009-01-12 2014-11-05 中兴通讯股份有限公司 一种密钥更替方法、***及设备
US8849328B2 (en) * 2009-04-03 2014-09-30 Huawei Technologies Co., Ltd. Base station sharing
US8161551B1 (en) * 2009-04-21 2012-04-17 Mcafee, Inc. System, method, and computer program product for enabling communication between security systems
EP2484137A4 (en) * 2009-09-28 2014-12-31 Unwired Planet Internat Ltd NEGOTIATION OF SECURITY FUNCTION BETWEEN NETWORK AND USER TERMINAL
CN102137400B (zh) * 2010-01-23 2015-04-01 中兴通讯股份有限公司 一种rrc连接重建立时的安全处理方法和***
CN103036897A (zh) * 2012-12-20 2013-04-10 曙光云计算技术有限公司 瘦客户端与服务器端之间基于远程桌面连接的通信方法
CN104144467B (zh) * 2013-05-10 2019-01-29 上海诺基亚贝尔股份有限公司 数据传输方法和设备
CN104243420A (zh) * 2013-06-18 2014-12-24 沈阳中科博微自动化技术有限公司 用于集成电路工厂自动化***与设备通讯的数据加密方法
US10390224B2 (en) 2014-05-20 2019-08-20 Nokia Technologies Oy Exception handling in cellular authentication
WO2015177397A1 (en) * 2014-05-20 2015-11-26 Nokia Technologies Oy Cellular network authentication
JP2016029787A (ja) * 2014-07-16 2016-03-03 キヤノン株式会社 情報処理装置、暗号化通信方法、およびプログラム
CN106850220B (zh) * 2017-02-22 2021-01-01 腾讯科技(深圳)有限公司 数据加密方法、数据解密方法及装置

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000036860A1 (en) * 1998-12-16 2000-06-22 Nokia Networks Oy A method for controlling connections to a mobile station
CN1282498A (zh) * 1997-12-18 2001-01-31 西门子公司 用于对无线传输的信息加密和用于验证用户的方法与通信***

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2108622B1 (es) * 1994-12-30 1998-07-01 Alcatel Standard Electrica Autentificacion de identidad de abonado en terminales celulares fijos.
US6556820B1 (en) * 1998-12-16 2003-04-29 Nokia Corporation Mobility management for terminals with multiple subscriptions
US6763112B1 (en) * 1999-09-28 2004-07-13 Nokia Networks Oy Security procedure in universal mobile telephone service
US7113600B1 (en) 1999-11-12 2006-09-26 Telefonaktiebolaget Lm Ericsson (Publ) Base transceiver station automatic encryption handling
DE10025271A1 (de) 2000-05-22 2001-11-29 Siemens Ag Verfahren zum Aufbau einer Verbindung zwischen einem Endgerät und einem bedienenden Mobilfunknetz, Mobilfunknetz und Endgerät dafür
WO2001091382A1 (en) * 2000-05-22 2001-11-29 Nokia Corporation System and method for providing a connection in a communication network
FI111423B (fi) * 2000-11-28 2003-07-15 Nokia Corp Järjestelmä kanavanvaihdon jälkeen tapahtuvan tietoliikenteen salauksen varmistamiseksi
ATE438277T1 (de) * 2000-12-01 2009-08-15 Nokia Corp Verfahren zum ausführen einer gebietsaktualisierung für ein endgerät in einem kommunikationsnetzwerk
US7184710B2 (en) * 2001-02-13 2007-02-27 Telefonaktiebolaget Lm Ericsson (Publ) Transmission of filtering/filtered information over the lur interface
FI112762B (fi) * 2001-03-09 2003-12-31 Nokia Corp Solukkoradioverkko
JP2004519179A (ja) * 2001-03-30 2004-06-24 ノキア コーポレイション 無線アクセスネットワーク間のハンドオーバーをサポートする方法
US7046992B2 (en) * 2001-05-11 2006-05-16 Telefonaktiebolaget Lm Ericsson (Publ) Authentication of termination messages in telecommunications system
FI113609B (fi) * 2001-06-29 2004-05-14 Nokia Corp Tukiaseman resurssinhallinta ja tukiasema
US7020455B2 (en) * 2001-11-28 2006-03-28 Telefonaktiebolaget L M Ericsson (Publ) Security reconfiguration in a universal mobile telecommunications system
CN1184833C (zh) * 2001-12-21 2005-01-12 华为技术有限公司 一种基于移动国家码确定保密通信中加密算法的方法
JP2005523613A (ja) * 2002-04-17 2005-08-04 トムソン ライセンシング ソシエテ アノニム 無線ローカルエリアネットワーク(wlan)/ユニバーサル移動体通信システムの相互接続用の公衆移動体ネットワークとしてのwlan

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1282498A (zh) * 1997-12-18 2001-01-31 西门子公司 用于对无线传输的信息加密和用于验证用户的方法与通信***
WO2000036860A1 (en) * 1998-12-16 2000-06-22 Nokia Networks Oy A method for controlling connections to a mobile station

Also Published As

Publication number Publication date
AU2002252934A1 (en) 2003-06-23
CN1426185A (zh) 2003-06-25
DE60228613D1 (de) 2008-10-09
ATE406720T1 (de) 2008-09-15
EP1455474A1 (en) 2004-09-08
EP1455474A4 (en) 2006-05-24
EP1455474B1 (en) 2008-08-27
US7474751B2 (en) 2009-01-06
CN1172469C (zh) 2004-10-20
US20050047597A1 (en) 2005-03-03

Similar Documents

Publication Publication Date Title
WO2003050988A1 (fr) Procede de selection d'une arithmetique de cryptage pour realiser une communication confidentielle
WO2003056851A1 (fr) Procede de determination d'un algorithme de cryptage de communication secrete d'apres des codes de pays mobiles
EP1593278B1 (en) Method for processing security message in mobile communication system
US6961588B2 (en) Mobile communications system and communications control method and mobile terminal device used therefor, control method thereof, and recording medium
US8046583B2 (en) Wireless terminal
JP5597676B2 (ja) 鍵マテリアルの交換
EP2536187B1 (en) Apparatuses and method for enhancing non-access stratum (nas) security in lte mobile units
CN109219965A (zh) 一种通信方法及相关装置
US10798082B2 (en) Network authentication triggering method and related device
US20170359719A1 (en) Key generation method, device, and system
JP2022502908A (ja) Nasメッセージのセキュリティ保護のためのシステム及び方法
JP2015053733A (ja) ハンドオーバー後の暗号化通信を確実にするシステム
JP2005110112A (ja) 通信システムにおける無線通信装置の認証方法及び無線通信装置及び基地局及び認証装置。
WO2009030164A1 (fr) Procédé, système et dispositif pour empêcher l'attaque par dégradation pendant qu'un terminal se déplace
CN101164257A (zh) 用于移动通信***中加密处理的***和方法
EP1305967A1 (en) Control of unciphered user traffic
US20110002272A1 (en) Communication apparatus and communication method
CN112105015B (zh) 二级认证的方法和装置
US11956715B2 (en) Communications method and apparatus
EP1422864B1 (en) Method of activating/deactivating encryption of data/voice in a mobile communication system
JP4506999B2 (ja) 無線lanシステム
CN100486347C (zh) 移动通信网络安全增值业务提供方法
CN100525156C (zh) 一种选择安全通信算法的方法
US7054306B2 (en) Method for handling ciphering status in a wireless network
EP1406423B1 (en) Network structure for encrypting of mobile communication system terminal and the method of realizing it

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 1589/DELNP/2004

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 10498334

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2002721959

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2002721959

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Ref document number: JP

WWG Wipo information: grant in national office

Ref document number: 2002721959

Country of ref document: EP