PRIVACY AND AUTHENTICATION ON A PORTABLE COMMUNICATIONS-SYSTEM

被引:103
作者
BELLER, MJ
CHANG, LF
YACOBI, Y
机构
[1] Bellcore, Red Bank, NJ 07701
关键词
D O I
10.1109/49.232291
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is expected that, in the near future, Portable Communications Systems (PCS's) will provide wireless access to the wireline telephone network for a large number of telephone calls. PCS's transmit conversations via radio, making them more susceptible to eavesdropping than are conversations carried via wires. Also, the mobility of PCS users presents new problems relating to 1) authentication-ensuring service is not obtained fraudulently, and 2) the privacy of information about the PCS user's location. It is important that PCS provide privacy (of conversation and location) and fraud control comparable to that of the wireline network. Provision of privacy and authentication hinges on the key agreement and authentication protocol. Such protocols can employ private-key and/or public-key cryptographic techniques. Public-key techniques hold the promise of simplifying the network infrastructure required to provide privacy and authentication. However, these techniques have heretofore been considered impractical for use in a low-cost low-power portable to private-telephone due to their higher computational complexity relative-key techniques. Three new public-key/private-key hybrid key agreement and authentication protocols, specially designed to be practical for implementation in a low-cost low-power portable telephone, are presented in this paper. The public-key protocols described herein have differing levels of security and complexity; and the tradeoffs are discussed.
引用
收藏
页码:821 / 829
页数:9
相关论文
共 23 条
[1]   FULLY-FLEDGED 2-WAY PUBLIC-KEY AUTHENTICATION AND KEY AGREEMENT FOR LOW-COST TERMINALS [J].
BELLER, MJ ;
YACOBI, Y .
ELECTRONICS LETTERS, 1993, 29 (11) :999-1001
[2]  
BIHAM E, 1990, AUG P CRYPTO 90 SAN
[3]  
Biham E., 1991, DIFFERENTIAL CRYPTAN
[4]  
BRICKELL EF, 1989, AUG CRYPTO 89 SANT B
[5]  
COX DC, 1990, JUL IEEE COMM MAG, V27
[6]  
DAVIES DW, 1989, SECURITY COMPUTER NE, P183
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
DUSSE SR, 1991, LECTURE NOTES COMPUT, V473
[9]  
FREEMAN J, 1991, NEWBRIDGE MICROSYSTE
[10]  
LENSTRA AJ, 1991, AUG CRYPTO 91 SANT B