Proceedings ArticleDOI
Privacy and authentication on a portable communications system
M.J. Beller,Li-Fung Chang,Y. Yacobi +2 more
- pp 1922-1927
Reads0
Chats0
TLDR
The authors discuss technical options to achieve adequate privacy and fraud control for portable communication systems and concentrate on the privacy of conversations on the radio link only.Abstract:
The authors discuss technical options to achieve adequate privacy and fraud control for portable communication systems. As the goal is to provide privacy at least comparable to that provided by wireline, the authors concentrate on the privacy of conversations on the radio link only. A high-level description of the portable communications system is presented, which provides a basis for further discussion. Message encryption is considered, the process by which a cipher function is applied to the portable communications systems data streams in order to deter eavesdroppers. Some background on public-key cryptography and some information regarding implementation of public-key techniques in low-power portable units are given. Key agreement and authentication protocols are outlined. >read more
Citations
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead
TL;DR: An overview of the SDR and CR certification process and how it is related to the security aspects is provided and the most critical challenges are summarized in the context of the future evolution of SDR/CR technologies.
Journal ArticleDOI
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
M.J. Beller,Y. Yacobi +1 more
TL;DR: A new public-key protocol has been developed for key agreement and authentication that provides security comparable to the well known RSA public- key protocol, but with two orders of magnitude less on-line computation required on one side of the protocol.
Journal ArticleDOI
Techniques for privacy and authentication in personal communication systems
TL;DR: The AKA method of preference for some proposed PCS air interfaces that are under development by standards bodies is indicated and three proposed AKA methods are compared using this model.
Journal ArticleDOI
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
TL;DR: A practical software library has been produced which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA), and the ECDSA and a previously proposed ECC-based wireless authentication protocol are implemented using the library.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Modular multiplication without trial division
TL;DR: A method for multiplying two integers modulo N while avoiding division by N, a representation of residue classes so as to speed modular multiplication without affecting the modular addition and subtraction algorithms.
Book
Cryptography and data security
TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Digitalized signatures and public-key functions as intractable as factorization
TL;DR: It is proved that for any given n, if the authors can invert the function y = E (x1) for even a small percentage of the values y then they can factor n, which seems to be the first proved result of this kind.
Journal Article
Data encryption standard
TL;DR: Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard) permet de proteger lesDonnees selon des criteres qui sont developpes dans ce texte.