5G+ 초연결 환경을 위한 암호기술 연구 |
Jang, Chan-Guk
(국민대학교 금융정보보안학과)
Kim, Hyeon-Gi (국민대학교 금융정보보안학과) Yun, Seung-Hwan (국민대학교 산학협력단) Lee, Ok-Yeon (국민대학교 정보보안암호수학과) |
1 | TS 35.205, "3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General", 2020 |
2 | TS 35.231, "Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification", 2020 |
3 | T. Specification, "TS 33 401 - V14.2.0 - Universal Mobile Telecommunications System(UMTS) 3G security Security Architecture(3GPP TS 33.401 version 14.2.0 Release 14)", 2017 |
4 | T. Specification, "TS 33 102 - V16.0.0 - 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture (3GPP TS.33. 102 version 16.0.0 Release 16) |
5 | Lily Chen, "Recommendation for Key Derivation Using Pseudorandom Functions" (Revised), NIST Special Publication 800-108, October 2009 |
6 | Elaine Barker, John Kelsey, "Recommendation for Random Number Generation Using Deterministic Random Bit Generators", NIST Special Publication 800-90A, June, 2015 |
7 | ITU-R, "Framework and overall objectives of the future development of IMT for 2020 and beyond", 2015.09 |
8 | 3GPP TS 33.501, "Security Architecture and pro- cedures for 5G System", 2020.09 |