scispace - formally typeset
Proceedings ArticleDOI

Privacy and authentication on a portable communications system

M.J. Beller, +2 more
- pp 1922-1927
Reads0
Chats0
TLDR
The authors discuss technical options to achieve adequate privacy and fraud control for portable communication systems and concentrate on the privacy of conversations on the radio link only.
Abstract
The authors discuss technical options to achieve adequate privacy and fraud control for portable communication systems. As the goal is to provide privacy at least comparable to that provided by wireline, the authors concentrate on the privacy of conversations on the radio link only. A high-level description of the portable communications system is presented, which provides a basis for further discussion. Message encryption is considered, the process by which a cipher function is applied to the portable communications systems data streams in order to deter eavesdroppers. Some background on public-key cryptography and some information regarding implementation of public-key techniques in low-power portable units are given. Key agreement and authentication protocols are outlined. >

read more

Citations
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead

TL;DR: An overview of the SDR and CR certification process and how it is related to the security aspects is provided and the most critical challenges are summarized in the context of the future evolution of SDR/CR technologies.
Journal ArticleDOI

Fully-fledged two-way public key authentication and key agreement for low-cost terminals

M.J. Beller, +1 more
- 27 May 1993 - 
TL;DR: A new public-key protocol has been developed for key agreement and authentication that provides security comparable to the well known RSA public- key protocol, but with two orders of magnitude less on-line computation required on one side of the protocol.
Journal ArticleDOI

Techniques for privacy and authentication in personal communication systems

TL;DR: The AKA method of preference for some proposed PCS air interfaces that are under development by standards bodies is indicated and three proposed AKA methods are compared using this model.
Journal ArticleDOI

High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor

TL;DR: A practical software library has been produced which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA), and the ECDSA and a previously proposed ECC-based wireless authentication protocol are implemented using the library.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

Modular multiplication without trial division

TL;DR: A method for multiplying two integers modulo N while avoiding division by N, a representation of residue classes so as to speed modular multiplication without affecting the modular addition and subtraction algorithms.
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.

Digitalized signatures and public-key functions as intractable as factorization

TL;DR: It is proved that for any given n, if the authors can invert the function y = E (x1) for even a small percentage of the values y then they can factor n, which seems to be the first proved result of this kind.
Journal Article

Data encryption standard

TL;DR: Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard) permet de proteger lesDonnees selon des criteres qui sont developpes dans ce texte.