Cryptographic algorithms and protocols for personal communication systems security
暂无分享,去创建一个
This paper deals with matters pertaining to the application of cryptographic techniques to the security of personal communication systems, with particular emphasis on smart card implementations of cryptographic schemes for subscriber authentication and network facility attribution. An overview of the applicable operational and security requirements of personal communication systems and smart cards is presented, with reference to the specification of current smart cards. The ETSI DECT standard is used as a basic example to show how a personal communication system may employ cryptographic techniques for authentication based upon a smart card used as an intelligent token, and how such a system may be developed. The generic aspects of such systems that are considered in particular are the security level, the card processing requirements, the processing overheads and the card storage requirements. >