DocumentCode :
288075
Title :
Cryptographic algorithms and protocols for personal communication systems security
Author :
Cooke, J.C. ; Brewster, R.L.
Author_Institution :
Aston Univ., UK
fYear :
1994
fDate :
1994
Firstpage :
42583
Lastpage :
42588
Abstract :
This paper deals with matters pertaining to the application of cryptographic techniques to the security of personal communication systems, with particular emphasis on smart card implementations of cryptographic schemes for subscriber authentication and network facility attribution. An overview of the applicable operational and security requirements of personal communication systems and smart cards is presented, with reference to the specification of current smart cards. The ETSI DECT standard is used as a basic example to show how a personal communication system may employ cryptographic techniques for authentication based upon a smart card used as an intelligent token, and how such a system may be developed. The generic aspects of such systems that are considered in particular are the security level, the card processing requirements, the processing overheads and the card storage requirements
Keywords :
cryptography; personal communication networks; protocols; smart cards; ETSI DECT standard; card processing; card storage requirements; cryptographic algorithms; intelligent token; network facility attribution; personal communication systems security; processing overheads; security level; smart cards; subscriber authentication;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Security and Cryptography Applications to Radio Systems, IEE Colloquium on
Conference_Location :
London
Type :
conf
Filename :
369659
Link To Document :
بازگشت