对认证与密钥协商协议(UMTS AKA)中无和有序列号SQN进行了3种攻击场景模拟并得到结论:SQN的使用不能有效抵抗重放攻击.基于此,进一步分析并仿真了使用一次性随机数抵抗重放攻击的3种改进协议,结果表明:AP-AKA和基于公钥密码学的AKA能够有效抵抗重放攻击,但是AP-AKA增加了实体的存储和计算资源,基于公钥密码学的AKA增加了算法的复杂性,而S-AKA只能部分抵抗重放攻击.
Three types of attacks' scenarios were described when there exists or not sequence number (SQN) in UMTS AKA. Analysis shows that the use of SQN cannot resist replay attacks effectively. Based on that, three new protocols using one-time random number were further analyzed and simulated to resist replay attacks. It is shown that AP-AKA and AKA based on public key cryptography can effectively a- gainst replay attacks. However, AP-AKA will add storage and computing resources of entities and AKA based on public key cryptography promotes the complexity of algorithm, but S-AKA only keeps against re- play attacks partially.