信息安全研究 ›› 2023, Vol. 9 ›› Issue (4): 331-.

• 学术论文 • 上一篇    下一篇

5G网络商用密码应用研究

唐明环;彭浩楠;王伟忠;查奇文;王聪;   

  1. (中国工业互联网研究院北京100102)
  • 出版日期:2023-04-01 发布日期:2023-03-30
  • 通讯作者: 唐明环 硕士,工程师.主要研究方向为基础通信网络安全、工业互联网安全、商用密码应用安全. tangminghuan@chinaaii.com

Research on the Application of Commercial Cryptography in 5G Network

  • Online:2023-04-01 Published:2023-03-30
  • About author:唐明环 硕士,工程师.主要研究方向为基础通信网络安全、工业互联网安全、商用密码应用安全. tangminghuan@chinaaii.com 彭浩楠 博士,高级工程师.主要研究方向为工业互联网安全、车联网安全、商用密码应用安全. penghaonan@chinaaii.com 王伟忠 博士,高级工程师.主要研究方向为工业互联网安全、车联网安全、商用密码应用安全. wangweizhong@chinaaii.com 查奇文 博士,高级工程师.主要研究方向为基础通信网络安全、工业互联网安全、商用密码应用安全. zhaqiwen@chinaaii.com 王聪 硕士,高级工程师.主要研究方向为网络安全、信息安全、商用密码应用安全. wangcong@chinaaii.com

摘要: 5G作为新一代移动通信网络基础设施,应用场景贯穿工业互联网、能源、交通、医疗、教育等生产生活的方方面面.终端大量接入、大规模网络部署、海量数据汇聚等特点为5G网络带来前所未有的安全风险,5G安全关系到社会发展、经济运行乃至国家安全,逐渐成为近年来国内外研究的热点.密码是保障网络与信息安全的核心技术和基础支撑,我国拥有自主知识产权的商用密码算法ZUC,SM4,SM3,SM2等经过十几年的发展,逐步在维护我国网络空间安全中发挥着越来越重要的作用.从5G网络架构及接口切入,分析了5G网络面临的安全风险,并提出了相应的商用密码应用方案,为5G网络商用密码应用实践提供参考.

关键词: 5G, 网络架构, 网络接口, 安全风险, 商用密码应用

Abstract: As a new generation of mobile communication network infrastructure, 5G application scenarios run through all aspects of production and life, such as industrial Internet, energy industry, transportation, medical industry and education. However, unprecedented security risks have been brought to 5G networks, including massive terminal access, largescale network deployment, and massive data aggregation. 5G security has gradually become a worldwide research trend in recent years since it is crucial to social development, economic operation, and even national security. Cryptography is the core technology and basic support to assure network and information security. After more than ten years of development, national commercial cryptographic algorithms ZUC, SM4, SM3, SM2, whose independent intellectual property rights are available, have gradually exerted more indispensable effects in maintaining the security of national cyberspace. Starting from the 5G network architecture and interfaces, this paper analyzes the underlying security risks faced by the 5G networks and proposes a corresponding solution as an example in terms of the commercial cryptography application practices of the 5G network.

Key words: 5G, network architecture, network interfaces, security risks, commercial cryptography application

中图分类号: