dc.contributor.author |
Grecas, CF |
en |
dc.contributor.author |
Maniatis, SI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.date.accessioned |
2014-03-01T01:19:04Z |
|
dc.date.available |
2014-03-01T01:19:04Z |
|
dc.date.issued |
2003 |
en |
dc.identifier.issn |
1383-469X |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/15358 |
|
dc.subject |
Asymmetric cryptography |
en |
dc.subject |
PKIs |
en |
dc.subject |
PLMNs |
en |
dc.subject.classification |
Computer Science, Hardware & Architecture |
en |
dc.subject.classification |
Computer Science, Information Systems |
en |
dc.subject.classification |
Telecommunications |
en |
dc.subject.other |
Algorithms |
en |
dc.subject.other |
Computer networks |
en |
dc.subject.other |
Data transfer |
en |
dc.subject.other |
Global system for mobile communications |
en |
dc.subject.other |
Radio systems |
en |
dc.subject.other |
Asymmetric cryptography |
en |
dc.subject.other |
Cryptography |
en |
dc.title |
Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration |
en |
heal.type |
journalArticle |
en |
heal.identifier.primary |
10.1023/A:1022285130956 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1023/A:1022285130956 |
en |
heal.language |
English |
en |
heal.publicationDate |
2003 |
en |
heal.abstract |
The logic ruling the user and network authentication as well as the data ciphering in the GSM architecture is characterized, regarding the transferring of the parameters employed in these processes, by transactions between three nodes of the system, that is the MS, actually the SIM, the visited MSC/VLR, and the AuC, which is attached to the HLR in most cases. The GPRS and the UMTS architecture carry the heritage of the GSM's philosophy regarding the user/network authentication and the data ciphering. So, the corresponding three nodes (MS, VLR, and HLR) of these systems are involved as well in the authentication and data ciphering procedures. Moreover, the methods of the conventional cryptography have been adopted by all three systems. This paper describes in brief the subscriber authentication and data ciphering, as they are recommended by the Specifications for all three aforementioned systems. Based on what the specifications define, we pinpoint the vulnerable points of the systems, exposed to third party attacks, and propose asymmetric cryptography procedures for their coverage, consisting of the introduction of public-private key pairs for the transactions between the VLR-HLR, as well as the MS-VLR. On the other hand, the nature of the services constituting a Public Key Infrastructure (PKI) renders the telecommunication operators the main candidates for the development of PKIs fully or partially fledged. The private-public key pair, stored by the PLMN operator in the SIM, for the GSM/GPRS case, or in the USIM for the UMTS case and created to deal initially with internal system functions, can easily be extended, adopted and employed in secure e/m-transactions, if bound to a digital certificate, in the case the PLMN operator supports PKI services as well. |
en |
heal.publisher |
KLUWER ACADEMIC PUBL |
en |
heal.journalName |
Mobile Networks and Applications |
en |
dc.identifier.doi |
10.1023/A:1022285130956 |
en |
dc.identifier.isi |
ISI:000180806800005 |
en |
dc.identifier.volume |
8 |
en |
dc.identifier.issue |
2 |
en |
dc.identifier.spage |
145 |
en |
dc.identifier.epage |
150 |
en |