diplomsko delo
Anže Nunar (Author), Arjana Žitnik (Mentor)

Abstract

Kartica SIM igra pomembno vlogo pri mobilni komunikaciji. Na kartici SIM je shranjen zasebni ključ uporabnika. Do njega dostopa algoritem COMP128, ki omogoča avtentikacijo uporabnika v mobilno omrežje in generiranje sejnih ključev za šifriranje komunikacij. V diplomskem delu podrobno opišemo algoritem COMP128. Napad nanj izvedemo z grobo silo. Pri tem izkoristimo slabosti v strukturi algoritma COMP128 in paradoks rojstnega dne, kar omogoča rekonstrukcijo zasebnega ključa v realnem času. Napad smo tudi implementirali in preizkusili. V posebnem poglavju predstavimo uporabljene koncepte iz kriptografije. To so avtentikacija, zgoščevalne funkcije in paradoks rojstnega dne.

Keywords

algoritem COMP128;avtentikacija;kartica SIM;kriptografija;napad z grobo silo;protokol GSM;paradoks rojstnega dne;računalništvo;računalništvo in informatika;računalništvo in matematika;univerzitetni študij;diplomske naloge;interdisciplinarni študij;

Data

Language: Slovenian
Year of publishing:
Typology: 2.11 - Undergraduate Thesis
Organization: UL FRI - Faculty of Computer and Information Science
Publisher: [A. Nunar]
UDC: 004.056:621.395.721.5(043.2)
COBISS: 1536612803 Link will open in a new window
Views: 1052
Downloads: 521
Average score: 0 (0 votes)
Metadata: JSON JSON-RDF JSON-LD TURTLE N-TRIPLES XML RDFA MICRODATA DC-XML DC-RDF RDF

Other data

Secondary language: English
Secondary title: ǂThe ǂCOMP128 algorithm and the SIM card
Secondary abstract: SIM card has an important role in mobile communications. It contains the user's private key, which is used in COMP128 algorithm for user authentication to the mobile network and generating session keys to encrypt communications. In this thesis a detailed description of COMP128 algorithm is presented. A brute force attack on the algorithm is described, which exploits a weakness in the structure of COMP128 algorithm, and is based on birthday paradox. As a result the user's private key can be obtained in real time. The attack on COMP128 algorithm was also implemented and tested. A separate chapter provides the necessary cryptographic concepts such as authentication, hash functions and birthday paradox.
Secondary keywords: COMP128 algorithm;authentication;SIM card;cryptography;brute-force attack;GSM protocol;birthday paradox;computer science;computer and information science;computer science and mathematics;diploma;interdisciplinary studies;
File type: application/pdf
Type (COBISS): Bachelor thesis/paper
Study programme: 1000407
Embargo end date (OpenAIRE): 1970-01-01
Thesis comment: Univ. v Ljubljani, Fak. za računalništvo in informatiko
Pages: 44 str.
ID: 9055664
Recommended works:
, diplomsko delo
, diplomsko delo
, zbirnik za spletne brskalnike