DocumentCode
276798
Title
Cryptographic security techniques for digital mobile telephones
Author
Cooke, J.C. ; Brewster, R.L.
Author_Institution
Aston Univ., Birmingham, UK
fYear
1992
fDate
23-25 Jun 1992
Firstpage
123
Lastpage
130
Abstract
Deals with various generic aspects concerning the application of cryptographic techniques to digital cordless and cellular telephone systems. The work presented is based on a review of literature regarding the relevant standards and recommendations for current and future systems. Particular reference is made to the ETSI GSM system. The aspects discussed include the choice of cryptographic algorithm, including public key cryptography, and the choice of protocols for such functions as cryptographic key management and user authentication. Various conclusions are drawn regarding the choice of the above, these being summarised by four key recommendations for current and future system design. The paper is concluded with a proposal for future research into the development of new security techniques for current and future systems
Keywords
cellular radio; cordless telephone systems; cryptography; digital radio systems; protocols; standards; ETSI; GSM system; cellular telephone systems; cryptographic algorithm; cryptographic key management; cryptographic techniques; digital cordless systems; digital mobile telephones; protocols; public key cryptography; recommendations; security techniques; standards; system design; user authentication;
fLanguage
English
Publisher
iet
Conference_Titel
Private Switching Systems and Networks, 1992. Second International Conference on
Conference_Location
London
Print_ISBN
0-85296-546-X
Type
conf
Filename
167154
Link To Document