Application of the LINE encryption scheme in the key encapsulation mechanism for the authentication protocol in 5G networks
DOI:
https://doi.org/10.30837/rt.2024.4.219.04Keywords:
LINE cryptosystem, 5G network, authentication, key distribution, logarithmic signature, APIAbstract
The 5G network is a key driver of digital transformation and the Fourth Industrial Revolution. The services offered by the 5G platform are synergistic and scalable, allowing for significantly increased data rates across different radio access technologies (RATs). 5G technology allows companies to connect more devices with faster information exchange, which leads to increased potential vulnerabilities and significantly expanded threat and attack vectors. Security and privacy issues, such as network spoofing and lack of privacy in previous RAN generations, have been closely studied by security experts. To address these issues, the 3GPP standardization bodies have defined the AKA authentication and key management protocol and procedures. These include mutual authentication between user devices and the network, signal integrity and confidentiality, and derivation of cryptographic keys to protect U-plane and C-plane data.
However, there are significant vulnerabilities in the 5G network APIs, in particular regarding weak protection of user personal data and the possibility of unauthorized access to IoT devices. These vulnerabilities are critical for remote control systems. The 5G-AKA protocol has been found to have shortcomings and it is generally believed that AKA does not provide adequate protection of personal data from active attackers. It is noted that AKA needs to be endowed with essential security features that are currently missing.
The paper considers the implementation of quantum-protected encryption for the development of authentication protocols and key distribution in networks. The paper presents a key encapsulation algorithm based on the LINE cryptosystem with logarithmic signatures for the development of authentication and key coordination protocols in 5G networks. The use of LINE directional encryption offers advantages in scalability and heterogeneity, optimizing the computational and operational costs of the network.
References
Liu F., Peng J., Zuo M. Toward a secure access to 5G network // Proceedings of the 17th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '18), New York, NY, USA, August 1–3, 2018. P. 1121–1128.
Wang Y., Zhang Z., Xie Y. Privacy-Preserving and Standard-Compatible AKA Protocol for 5G // Proceedings of the 30th USENIX Security Symposium (USENIX Security '21), Online, 11–13 August 2021; USENIX Association: Vancouver, BC, Canada, 2021. P. 3595–3612. Available online: https://www.usenix.org/conference/usenixsecurity21/ presentation/wang-yuchen .
Xiao Y., Wu Y. 5G-IPAKA: An improved primary authentication and key agreement protocol for 5g networks // Information. 2022. №13. 125 р.
Arkko J., Norrman K., Mattsson JP Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA'FS). Internet-Draft draft-ietf-emu-aka-pfs-11, Internet Engineering Task Force. 2023. Available online: https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/11/
3GPP. Security Architecture and Procedures for 5G System TS33.501 v18.2.0. Technical Report, The 3rd Generation Partnership Project. 2023. Available online: https://portal.3gpp.org/desktopmodules/Specifications/ SpecificationDetails.aspx? specificationId=3169.
Køien GM The SUCI-AKA Authentication Protocol for 5G Systems. In Proceedings of the 13rd NISK Conference on Norwegian Information Security (NISK'20), Online, 23–25 November 2020. Available online: https://ojs.bibsys.no/index.php/NIK/article/view/885.
Xiao Y., Gao S. 5GAKA-LCCO: A secure 5G authentication and key agreement protocol with less communication and computation overhead // Information. 2022. №13. 257 р.
Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian & Valtteri Niemi. A Beyond-5G Authentication and Key Agreement Protocol // International Conference on Network and System Security NSS 2022: Network and System Security 07 December 2022. P. 249–264.
3GPP. Authentication and Key Management for Applications (AKMA) https://portal.3gpp.org/ desktopmodules/ Specifications/ SpecificationDetails.aspx? specificationId=3690
NIST. Submission requirements and evaluation criteria for the postquantum cryptography standardization process, 2016. https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/ call-for-proposals-final-dec- 2016.
Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov. LINE: Cryptosystem based on linear equations for logarithmic signatures. https://eprint.iacr.org/2024/697.pdf, Paper 2024/697.
Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov “SIGNLINE: Digital signature scheme based on linear equations cryptosystem”. https://doi.org/10.48550/arXiv.2405.16227
Kotukh Y., & Khalimov H. Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives // Challenges and Issues of Modern Science. 2024. No 2. P. 296–299. https://cims.fti.dp.ua/j/article/view/119
Котух Є., Халімов Г., & Коробчинський М. Побудова покращеної схеми шифрування на узагальнених Сузукі 2-групах в криптосистемі MST3 // Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка». 2023. No 2(22). P. 19–30. https://doi.org/10.28925/2663-4023.2023.22.1930
Kotukh Y., Khalimov G., Korobchynskyi M., Rudenko M., Liubchak V., Matsyuk S., & Chashchyn M. Research horizons in group cryptography in the context of post-quantum cryptosystems development // Radiotekhnika. 2024. No 216. P. 62–72. https://doi.org/10.30837/rt.2024.1.216.05
Gennady Khalimov, Yevgen Kotukh, Oleksandr Sievierinov, Svitlana Khalimova,Sang-Yoon Chang, Yaroslav Balytskyi Strong Encryption Based on the small Ree groups // International Conference “Problems of Infocommunications. Science and Technology” (PIC S&T′2022) 10 – 12 October, 2022 Proceedings, 2022. P. 439–444.
Khalimov, G., Kotukh, Y., Chang, S.-Y., Balytskyi, Y. Khalimova, S., Marukhnenko, O. Encryption Scheme Based on the Generalized Suzuki 2-groups and Homomorphic Encryption Communications in Computer and Information Science, 2022, 1536 CCIS. P. 59–76.
Khalimov G., Kotukh Y., Khalimova S., ... Marukhnenko O., Tsyplakov D. Towards advance encryption based on a Generalized Suzuki 2-groups // International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2021.
Khalimov G., Kotukh Y., Didmanidze I., ... Khalimova S., Vlasov A. Towards three-parameter group encryption scheme for MST3 cryptosystem improvement // Proceedings of the 2021 5th World Conference on Smart Trends in Systems Security and Sustainability. WorldS4 2021, 2021. P. 204–211.
Downloads
Published
Versions
- 2025-03-31 (2)
- 2025-03-16 (1)
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).