Application of the LINE encryption scheme in the key encapsulation mechanism for the authentication protocol in 5G networks

Authors

DOI:

https://doi.org/10.30837/rt.2024.4.219.04

Keywords:

LINE cryptosystem, 5G network, authentication, key distribution, logarithmic signature, API

Abstract

The 5G network is a key driver of digital transformation and the Fourth Industrial Revolution. The services offered by the 5G platform are synergistic and scalable, allowing for significantly increased data rates across different radio access technologies (RATs). 5G technology allows companies to connect more devices with faster information exchange, which leads to increased potential vulnerabilities and significantly expanded threat and attack vectors. Security and privacy issues, such as network spoofing and lack of privacy in previous RAN generations, have been closely studied by security experts. To address these issues, the 3GPP standardization bodies have defined the AKA authentication and key management protocol and procedures. These include mutual authentication between user devices and the network, signal integrity and confidentiality, and derivation of cryptographic keys to protect U-plane and C-plane data.

However, there are significant vulnerabilities in the 5G network APIs, in particular regarding weak protection of user personal data and the possibility of unauthorized access to IoT devices. These vulnerabilities are critical for remote control systems. The 5G-AKA protocol has been found to have shortcomings and it is generally believed that AKA does not provide adequate protection of personal data from active attackers. It is noted that AKA needs to be endowed with essential security features that are currently missing.

The paper considers the implementation of quantum-protected encryption for the development of authentication protocols and key distribution in networks. The paper presents a key encapsulation algorithm based on the LINE cryptosystem with logarithmic signatures for the development of authentication and key coordination protocols in 5G networks. The use of LINE directional encryption offers advantages in scalability and heterogeneity, optimizing the computational and operational costs of the network.

References

Liu F., Peng J., Zuo M. Toward a secure access to 5G network // Proceedings of the 17th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '18), New York, NY, USA, August 1–3, 2018. P. 1121–1128.

Wang Y., Zhang Z., Xie Y. Privacy-Preserving and Standard-Compatible AKA Protocol for 5G // Proceedings of the 30th USENIX Security Symposium (USENIX Security '21), Online, 11–13 August 2021; USENIX Association: Vancouver, BC, Canada, 2021. P. 3595–3612. Available online: https://www.usenix.org/conference/usenixsecurity21/ presentation/wang-yuchen .

Xiao Y., Wu Y. 5G-IPAKA: An improved primary authentication and key agreement protocol for 5g networks // Information. 2022. №13. 125 р.

Arkko J., Norrman K., Mattsson JP Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA'FS). Internet-Draft draft-ietf-emu-aka-pfs-11, Internet Engineering Task Force. 2023. Available online: https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/11/

3GPP. Security Architecture and Procedures for 5G System TS33.501 v18.2.0. Technical Report, The 3rd Generation Partnership Project. 2023. Available online: https://portal.3gpp.org/desktopmodules/Specifications/ SpecificationDetails.aspx? specificationId=3169.

Køien GM The SUCI-AKA Authentication Protocol for 5G Systems. In Proceedings of the 13rd NISK Conference on Norwegian Information Security (NISK'20), Online, 23–25 November 2020. Available online: https://ojs.bibsys.no/index.php/NIK/article/view/885.

Xiao Y., Gao S. 5GAKA-LCCO: A secure 5G authentication and key agreement protocol with less communication and computation overhead // Information. 2022. №13. 257 р.

Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian & Valtteri Niemi. A Beyond-5G Authentication and Key Agreement Protocol // International Conference on Network and System Security NSS 2022: Network and System Security 07 December 2022. P. 249–264.

3GPP. Authentication and Key Management for Applications (AKMA) https://portal.3gpp.org/ desktopmodules/ Specifications/ SpecificationDetails.aspx? specificationId=3690

NIST. Submission requirements and evaluation criteria for the postquantum cryptography standardization process, 2016. https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/ call-for-proposals-final-dec- 2016.

Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov. LINE: Cryptosystem based on linear equations for logarithmic signatures. https://eprint.iacr.org/2024/697.pdf, Paper 2024/697.

Gennady Khalimov, Yevgen Kotukh, Maksym Kolisnyk, Svitlana Khalimova, Oleksandr Sievierinov “SIGNLINE: Digital signature scheme based on linear equations cryptosystem”. https://doi.org/10.48550/arXiv.2405.16227

Kotukh Y., & Khalimov H. Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives // Challenges and Issues of Modern Science. 2024. No 2. P. 296–299. https://cims.fti.dp.ua/j/article/view/119

Котух Є., Халімов Г., & Коробчинський М. Побудова покращеної схеми шифрування на узагальнених Сузукі 2-групах в криптосистемі MST3 // Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка». 2023. No 2(22). P. 19–30. https://doi.org/10.28925/2663-4023.2023.22.1930

Kotukh Y., Khalimov G., Korobchynskyi M., Rudenko M., Liubchak V., Matsyuk S., & Chashchyn M. Research horizons in group cryptography in the context of post-quantum cryptosystems development // Radiotekhnika. 2024. No 216. P. 62–72. https://doi.org/10.30837/rt.2024.1.216.05

Gennady Khalimov, Yevgen Kotukh, Oleksandr Sievierinov, Svitlana Khalimova,Sang-Yoon Chang, Yaroslav Balytskyi Strong Encryption Based on the small Ree groups // International Conference “Problems of Infocommunications. Science and Technology” (PIC S&T′2022) 10 – 12 October, 2022 Proceedings, 2022. P. 439–444.

Khalimov, G., Kotukh, Y., Chang, S.-Y., Balytskyi, Y. Khalimova, S., Marukhnenko, O. Encryption Scheme Based on the Generalized Suzuki 2-groups and Homomorphic Encryption Communications in Computer and Information Science, 2022, 1536 CCIS. P. 59–76.

Khalimov G., Kotukh Y., Khalimova S., ... Marukhnenko O., Tsyplakov D. Towards advance encryption based on a Generalized Suzuki 2-groups // International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2021.

Khalimov G., Kotukh Y., Didmanidze I., ... Khalimova S., Vlasov A. Towards three-parameter group encryption scheme for MST3 cryptosystem improvement // Proceedings of the 2021 5th World Conference on Smart Trends in Systems Security and Sustainability. WorldS4 2021, 2021. P. 204–211.

Published

2025-03-16 — Updated on 2025-03-31

Versions

How to Cite

Kotukh, Y., Khalimov, G., Dzhura, I., & Hivrenko, H. (2025). Application of the LINE encryption scheme in the key encapsulation mechanism for the authentication protocol in 5G networks. Radiotekhnika, (219), 36–45. https://doi.org/10.30837/rt.2024.4.219.04 (Original work published March 16, 2025)

Issue

Section

Articles