Title :
The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication
Author :
Wu, Hsiao-kuang ; Yang, Shu-ching ; Lin, Yung-Tai
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nat. Central Univ., Chung-Li, Taiwan
Abstract :
With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information, including news reports, stock fluctuations, mobile banks, e-commerce and browse the Internet at any time, anywhere. For current devices with lower power and finite computing capability, it is not suitable to encrypt the transmission message using the public-key encryption algorithm. We propose a new protocol for digital mobile communications. This protocol permits users to hold a secure conference and ensures public safety. Considering the limited computing capability of the mobile phone device, we improve the traditional symmetric key encryption algorithm to achieve end-to-end security and non-repudiation for each individual communication connection. Different from the public-key encryption algorithm, non-repudiation of our proposed symmetric key encryption algorithm is arbitrated once the communication is disputed or doubted to endanger public safety. To achieve end-to-end security and non-repudiation service we will distribute the session key components to several believable organizations, called KETO (Key Escrow Trust Organization)
Keywords :
cellular radio; cryptography; data privacy; electronic commerce; mobile communication; protocols; safety; telecommunication security; GSM; Internet; KETO; Key Escrow Trust Organization; SSKC algorithm; WAP; Wireless Application Protocol; digital mobile communications; electronic commerce; end-to-end secure wireless communication; mobile phone; nonrepudiation service; public safety; public-key encryption; real-time information; secure conference; sharing session key component algorithm; symmetric key encryption algorithm; value-added services; Access protocols; Cryptography; Fluctuations; Internet; Mobile communication; Mobile handsets; Public key; Safety; Security; Wireless application protocol;
Conference_Titel :
Security Technology, 2000. Proceedings. IEEE 34th Annual 2000 International Carnahan Conference on
Conference_Location :
Ottawa, Ont.
Print_ISBN :
0-7803-5965-8
DOI :
10.1109/CCST.2000.891194