HEAL DSpace

Towards the introduction of the asymmetric cryptography in GSM, GPRS, and UMTS networks

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Grecas, CF en
dc.contributor.author Maniatis, SI en
dc.contributor.author Venieris, IS en
dc.date.accessioned 2014-03-01T02:42:02Z
dc.date.available 2014-03-01T02:42:02Z
dc.date.issued 2001 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/30736
dc.subject General Packet Radio Service en
dc.subject Home Location Register en
dc.subject Mobile Station en
dc.subject Universal Mobile Telecommunication System en
dc.subject Visitor Location Register en
dc.subject.other Algorithms en
dc.subject.other Decoding en
dc.subject.other Global system for mobile communications en
dc.subject.other Signal encoding en
dc.subject.other Universal mobile telecommunication system (UMTS) en
dc.subject.other Cryptography en
dc.title Towards the introduction of the asymmetric cryptography in GSM, GPRS, and UMTS networks en
heal.type conferenceItem en
heal.identifier.primary 10.1109/ISCC.2001.935349 en
heal.identifier.secondary http://dx.doi.org/10.1109/ISCC.2001.935349 en
heal.publicationDate 2001 en
heal.abstract The logic ruling the user and network authentication as well as the data ciphering in the GSM architecture has been inherited by the General Packet Radio Services (GPRS) and the Universal Mobile Telecommunication System (UMTS) as well. So, in all these systems, three nodes are involved in the corresponding processes; namely, the Mobile Station (MS), the Visitors Location Register (VLR), and the Home Location Register (HLR). Moreover, the methods of the conventional cryptography have been adopted by all the three systems. In this paper a description of the subscriber authentication is given, as well as of the data ciphering, as they are recommended by the Specifications regarding the aforementioned systems. Based on this analysis, we pinpoint the vulnerable points of the VLR-HLR and MS-VLR links, exposed to third party attacks, and we propose for their coverage asymmetric cryptography procedures, consisting of the introduction of public-private key pairs for the transactions between the VLR-HLR, as well a s the MS-VLR. en
heal.journalName IEEE Symposium on Computers and Communications - Proceedings en
dc.identifier.doi 10.1109/ISCC.2001.935349 en
dc.identifier.spage 15 en
dc.identifier.epage 21 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής