Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems
AU - Samarakoon, M.I.
AU - Honary, Bahram
PY - 1999/9
Y1 - 1999/9
N2 - Digital portable communications systems (PCS) use cryptographic security techniques to provide privacy to traffic and to prevent fraudulent use of the system resources. Both secret-key and public-key cryptographic protocols are available to provide security to PCS. We present a new protocol, which combines secret-key and public-key techniques. This hybrid protocol has the advantages over the other conventional protocols of not having to maintain a database of secret keys in the PCS networks, and not having to perform the complex and time consuming calculations at the time of authentication in the portables.
AB - Digital portable communications systems (PCS) use cryptographic security techniques to provide privacy to traffic and to prevent fraudulent use of the system resources. Both secret-key and public-key cryptographic protocols are available to provide security to PCS. We present a new protocol, which combines secret-key and public-key techniques. This hybrid protocol has the advantages over the other conventional protocols of not having to maintain a database of secret keys in the PCS networks, and not having to perform the complex and time consuming calculations at the time of authentication in the portables.
U2 - 10.1049/ic:19990851
DO - 10.1049/ic:19990851
M3 - Conference contribution/Paper
SP - 9/1-9/5
BT - Novel DSP Algorithms and Architectures for Radio Systems, IEE Colloquium on
PB - IEEE
CY - London
ER -