dc.contributor.author |
Grecas, CF |
en |
dc.contributor.author |
Maniatis, SI |
en |
dc.contributor.author |
Venieris, IS |
en |
dc.date.accessioned |
2014-03-01T02:42:02Z |
|
dc.date.available |
2014-03-01T02:42:02Z |
|
dc.date.issued |
2001 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/30736 |
|
dc.subject |
General Packet Radio Service |
en |
dc.subject |
Home Location Register |
en |
dc.subject |
Mobile Station |
en |
dc.subject |
Universal Mobile Telecommunication System |
en |
dc.subject |
Visitor Location Register |
en |
dc.subject.other |
Algorithms |
en |
dc.subject.other |
Decoding |
en |
dc.subject.other |
Global system for mobile communications |
en |
dc.subject.other |
Signal encoding |
en |
dc.subject.other |
Universal mobile telecommunication system (UMTS) |
en |
dc.subject.other |
Cryptography |
en |
dc.title |
Towards the introduction of the asymmetric cryptography in GSM, GPRS, and UMTS networks |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/ISCC.2001.935349 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/ISCC.2001.935349 |
en |
heal.publicationDate |
2001 |
en |
heal.abstract |
The logic ruling the user and network authentication as well as the data ciphering in the GSM architecture has been inherited by the General Packet Radio Services (GPRS) and the Universal Mobile Telecommunication System (UMTS) as well. So, in all these systems, three nodes are involved in the corresponding processes; namely, the Mobile Station (MS), the Visitors Location Register (VLR), and the Home Location Register (HLR). Moreover, the methods of the conventional cryptography have been adopted by all the three systems. In this paper a description of the subscriber authentication is given, as well as of the data ciphering, as they are recommended by the Specifications regarding the aforementioned systems. Based on this analysis, we pinpoint the vulnerable points of the VLR-HLR and MS-VLR links, exposed to third party attacks, and we propose for their coverage asymmetric cryptography procedures, consisting of the introduction of public-private key pairs for the transactions between the VLR-HLR, as well a s the MS-VLR. |
en |
heal.journalName |
IEEE Symposium on Computers and Communications - Proceedings |
en |
dc.identifier.doi |
10.1109/ISCC.2001.935349 |
en |
dc.identifier.spage |
15 |
en |
dc.identifier.epage |
21 |
en |