论文部分内容阅读
基于SHA-1的ESA鉴权算法是个标准化的算法组,一般只认为其是AKA的增强型。从具体算法设计出发,说明ESA可以具有的检查盗号现象的应用特征,并将其同基于Rijdael算法AKA相比较,指出在一次鉴权过程中其算法结果利用率仅为AKA的一半。
The SHA-1-based ESA authentication algorithm is a standardized set of algorithms and is generally considered only as an enhancement to AKA. Starting from the concrete algorithm design, this paper illustrates the application features of ESA which can check the hacking phenomenon. Compared with AKA based on Rijdael algorithm, it points out that the utilization of the algorithm results is only half of AKA in one authentication process.