首页> 外文期刊>Mobile networks & applications >Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration
【24h】

Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration

机译:GSM,GPRS,UMTS中的非对称加密及其公共密钥基础结构集成的介绍

获取原文
获取原文并翻译 | 示例
           

摘要

The logic ruling the user and network authentication as well as the data ciphering in the GSM architecture is characterized, regarding the transferring of the parameters employed in these processes, by transactions between three nodes of the system, that is the MS, actually the SIM, the visited MSC/VLR, and the AuC, which is attached to the HLR in most cases. The GPRS and the UMTS architecture carry the heritage of the GSM's philosophy regarding the useretwork authentication and the data ciphering. So, the corresponding three nodes (MS, VLR, and HLR) of these systems are involved as well in the authentication and data ciphering procedures. Moreover, the methods of the conventional cryptography have been adopted by all three systems. This paper describes in brief the subscriber authentication and data ciphering, as they are recommended by the Specifications for all three aforementioned systems. Based on what the specifications define, we pinpoint the vulnerable points of the systems, exposed to third party attacks, and propose asymmetric cryptography procedures for their coverage, consisting of the introduction of public-private key pairs for the transactions between the VLR-HLR, as well as the MS-VLR. On the other hand, the nature of the services constituting a Public Key Infrastructure (PKI) renders the telecommunication operators the main candidates for the development of PKIs fully or partially fledged. The private-public key pair, stored by the PLMN operator in the SIM, for the GSM/GPRS case, or in the USIM for the UMTS case and created to deal initially with internal system functions, can easily be extended, adopted and employed in secure e/m-transactions, if bound to a digital certificate, in the case the PLMN operator supports PKI services as well.
机译:关于用户和网络身份验证以及GSM架构中数据加密的逻辑,其特征在于,通过系统的三个节点(即MS,实际上是SIM)之间的交易来传输这些过程中使用的参数。在大多数情况下,访问的MSC / VLR以及连接到HLR的AuC。 GPRS和UMTS体系结构继承了GSM关于用户/网络认证和数据加密的哲学思想。因此,这些系统的相应三个节点(MS,VLR和HLR)也涉及身份验证和数据加密过程。此外,所有三个系统都采用了常规密码学的方法。本文简要描述了订户身份验证和数据加密,这是《规范》对所有上述三个系统所推荐的。根据规范的定义,我们可以精确定位系统的易受攻击点,以应对第三方攻击,并针对其覆盖范围提出不对称加密程序,包括为VLR-HLR之间的交易引入公私钥对,以及MS-VLR。另一方面,构成公钥基础设施(PKI)的服务的性质使电信运营商成为全部或部分成熟PKI的主要候选人。 PLMN运营商将它们存储在GSM / GPRS情况下的SIM中,或者将UMTS情况下的USIM中存储并最初用于处理内部系统功能的情况下,可以很容易地对其进行扩展,采用和采用。如果PLMN运营商也支持PKI服务,则安全的e / m交易(如果绑定到数字证书)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号