scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

G3 facsimile security option-UK proposal for ITU-TS recommendation

16 May 1995-pp 146-150
TL;DR: This G3 facsimile security option, which is being considered by the ITU-TS (International Telecommunication Union-Telecommunication Standards Sector) for the international standard, fulfils market requirements with currentfacsimile technology, existing transmission principles, negligible additional hardware and minimal software change.
Abstract: The presented facsimile security proposal, made from the British Facsimile Industry Consultative Committee, addresses both the security aspect of the transmission and the parallel requirements for message integrity and authentication. The proposal uses two cypher algorithms: HFX40, which is used for the secure transfer of the main facsimile message, and HKM, which is used for secure key management. This G3 facsimile security option, which is being considered by the ITU-TS (International Telecommunication Union-Telecommunication Standards Sector) for the international standard, fulfils market requirements with current facsimile technology, existing transmission principles, negligible additional hardware and minimal software change. It is the only detailed proposal to be made, it has no known limitations and will hopefully be agreed for implementation in 1996.
Citations
More filters
Patent
23 Aug 2005
TL;DR: In this article, the authors describe a data encryption/decryption device for a communication equipment exchanging data with another communication equipment (e.g., an internet protocol communication network) comprising of a Data Encryption/Decryption device.
Abstract: The method involves transmitting a message, containing data allowing determination of a primary encryption key, from a group 3 type calling server (E1) to a group 3 type called fax machine (E2). Another message containing data representing capability of the machine to ensure data encryption/decryption is transmitted from the machine to the server. Data to be transmitted is encrypted in the server and then transmitted to the machine via a communication network (RIP) when the server and machine are suitable for data encryption/decryption. The data is decrypted in the machine using the key. Independent claims are also included for the following: (1) a data encryption/decryption device for a communication equipment exchanging data with another communication equipment (2) a communication equipment for an internet protocol communication network, comprising a data encryption/decryption device.

5 citations