This paper focuses on the security of Internet access over the third generation mobile telecommunication networks. We explore the characteristics of cryptographic attacks and the similarities between the exposures of different secret keys in cryptographic attacks and propose three measures that limit the exposure of the sensible secret key. These measures are the usage of a temporary key, TK, the protection of the messages that could be used by a cryptanalyst to recover the secret key and the increase of the size of the secret key.
展开▼