Title :
Novel methods for enabling public key schemes in future mobile systems
Author :
Komninos, N. ; Honary, B.
Author_Institution :
Lancaster Univ., UK
Abstract :
It is essential to enable public key schemes in future mobile systems to solve current problems in authentication and key management for end-to-end security. We propose new procedures for enabling public key schemes in future mobile terminals. The proposed procedures are based on the complex public key computations that can be performed either in the SIM card or in the terminal itself Multiple cryptoprocessors are also used to decrease the processing time required to perform the complex public key computations.
Keywords :
cellular radio; microprocessor chips; multiprocessing systems; public key cryptography; radio networks; telecommunication security; GSM network; SIM card; authentication; key management; mobile systems; mobile terminals; multiple cryptoprocessors; processing time reduction; public key computations; public key schemes; security;
Conference_Titel :
3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489)
Print_ISBN :
0-85296-749-7
DOI :
10.1049/cp:20020438