DocumentCode
3390672
Title
Efficient key distribution for slow computing devices: achieving fast over the air activation for wireless systems
Author
Carroll, Chris ; Frankel, Yair ; Tsiounis, Yiannis
Author_Institution
GTE Labs. Inc., Waltham, MA, USA
fYear
1998
fDate
3-6 May 1998
Firstpage
66
Lastpage
76
Abstract
Any system which contains some form of cryptographic authentication, confidentiality and/or identification requires the provisioning of a secure key generation and distribution capability. The key distribution mechanism for wireless cellular systems, such as IS-95 CDMA, IS-136 TDMA and IS-91 Analog, has recently been investigated by the Telephone Industry Association´s standards working groups. There are several requirements that a cellular key provisioning system must satisfy; however, the current approaches for such generation and distribution are in general inadequate. As with any commercial application, the system must satisfy cost (e.g., efficiency by all parties, minimal specialized equipment, etc.), convenience and most of all security requirements. The cellular system requirements, however, are much more constraining than most environments since the customers´ cellular phones have minimal computational capabilities and the authenticated setup protocol is generally performed with the user and carrier never meeting face to face. Moreover, the cellular phone companies are also insisting, for business competition needs, that the key distribution and generation mechanism is as convenient and transparent to the user (customer) as possible. We propose a cryptographically secure approach for such generation and distribution which will satisfy the phone industries´ needs as well as the needs of other applications using slow devices
Keywords
cellular radio; code division multiple access; cryptography; message authentication; protocols; time division multiple access; A and IS-91 Analog; IS-136 TDMA; IS-95 CDMA; Telephone Industry Association; authenticated setup protocol; business competition needs; cellular key provisioning system; cellular phone companies; cellular phones; cellular system requirements; commercial application; confidentiality; cryptographic authentication; cryptographically secure approach; fast over the air activation; identification; key distribution; key distribution mechanism; minimal specialized equipment; phone industries; secure key generation; security requirements; slow computing devices; wireless cellular systems; Authentication; Cellular phones; Costs; Cryptography; Distributed computing; Multiaccess communication; Standards Working Groups; Telephony; Time division multiple access; Wireless cellular systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium on
Conference_Location
Oakland, CA
ISSN
1081-6011
Print_ISBN
0-8186-8386-4
Type
conf
DOI
10.1109/SECPRI.1998.674824
Filename
674824
Link To Document