HEAL DSpace

Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Grecas, CF en
dc.contributor.author Maniatis, SI en
dc.contributor.author Venieris, IS en
dc.date.accessioned 2014-03-01T01:19:04Z
dc.date.available 2014-03-01T01:19:04Z
dc.date.issued 2003 en
dc.identifier.issn 1383-469X en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/15358
dc.subject Asymmetric cryptography en
dc.subject PKIs en
dc.subject PLMNs en
dc.subject.classification Computer Science, Hardware & Architecture en
dc.subject.classification Computer Science, Information Systems en
dc.subject.classification Telecommunications en
dc.subject.other Algorithms en
dc.subject.other Computer networks en
dc.subject.other Data transfer en
dc.subject.other Global system for mobile communications en
dc.subject.other Radio systems en
dc.subject.other Asymmetric cryptography en
dc.subject.other Cryptography en
dc.title Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration en
heal.type journalArticle en
heal.identifier.primary 10.1023/A:1022285130956 en
heal.identifier.secondary http://dx.doi.org/10.1023/A:1022285130956 en
heal.language English en
heal.publicationDate 2003 en
heal.abstract The logic ruling the user and network authentication as well as the data ciphering in the GSM architecture is characterized, regarding the transferring of the parameters employed in these processes, by transactions between three nodes of the system, that is the MS, actually the SIM, the visited MSC/VLR, and the AuC, which is attached to the HLR in most cases. The GPRS and the UMTS architecture carry the heritage of the GSM's philosophy regarding the user/network authentication and the data ciphering. So, the corresponding three nodes (MS, VLR, and HLR) of these systems are involved as well in the authentication and data ciphering procedures. Moreover, the methods of the conventional cryptography have been adopted by all three systems. This paper describes in brief the subscriber authentication and data ciphering, as they are recommended by the Specifications for all three aforementioned systems. Based on what the specifications define, we pinpoint the vulnerable points of the systems, exposed to third party attacks, and propose asymmetric cryptography procedures for their coverage, consisting of the introduction of public-private key pairs for the transactions between the VLR-HLR, as well as the MS-VLR. On the other hand, the nature of the services constituting a Public Key Infrastructure (PKI) renders the telecommunication operators the main candidates for the development of PKIs fully or partially fledged. The private-public key pair, stored by the PLMN operator in the SIM, for the GSM/GPRS case, or in the USIM for the UMTS case and created to deal initially with internal system functions, can easily be extended, adopted and employed in secure e/m-transactions, if bound to a digital certificate, in the case the PLMN operator supports PKI services as well. en
heal.publisher KLUWER ACADEMIC PUBL en
heal.journalName Mobile Networks and Applications en
dc.identifier.doi 10.1023/A:1022285130956 en
dc.identifier.isi ISI:000180806800005 en
dc.identifier.volume 8 en
dc.identifier.issue 2 en
dc.identifier.spage 145 en
dc.identifier.epage 150 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής