• DocumentCode
    288075
  • Title

    Cryptographic algorithms and protocols for personal communication systems security

  • Author

    Cooke, J.C. ; Brewster, R.L.

  • Author_Institution
    Aston Univ., UK
  • fYear
    1994
  • fDate
    1994
  • Firstpage
    42583
  • Lastpage
    42588
  • Abstract
    This paper deals with matters pertaining to the application of cryptographic techniques to the security of personal communication systems, with particular emphasis on smart card implementations of cryptographic schemes for subscriber authentication and network facility attribution. An overview of the applicable operational and security requirements of personal communication systems and smart cards is presented, with reference to the specification of current smart cards. The ETSI DECT standard is used as a basic example to show how a personal communication system may employ cryptographic techniques for authentication based upon a smart card used as an intelligent token, and how such a system may be developed. The generic aspects of such systems that are considered in particular are the security level, the card processing requirements, the processing overheads and the card storage requirements
  • Keywords
    cryptography; personal communication networks; protocols; smart cards; ETSI DECT standard; card processing; card storage requirements; cryptographic algorithms; intelligent token; network facility attribution; personal communication systems security; processing overheads; security level; smart cards; subscriber authentication;
  • fLanguage
    English
  • Publisher
    iet
  • Conference_Titel
    Security and Cryptography Applications to Radio Systems, IEE Colloquium on
  • Conference_Location
    London
  • Type

    conf

  • Filename
    369659