1 / 16

Identity-based Cryptography for Securing Mobile Phone Calls

Identity-based Cryptography for Securing Mobile Phone Calls. 2009 International Conference on Advanced Information Networking and Applications Workshops. Matthew Smith, Christian Schridde, Bj ¨orn Agel, Bernd Freisleben. OutLine. Introduction Protocol Implementation Issues

Download Presentation

Identity-based Cryptography for Securing Mobile Phone Calls

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity-based Cryptography for Securing Mobile Phone Calls 2009 International Conference on Advanced Information Networking and Applications Workshops Matthew Smith, Christian Schridde, Bj ¨orn Agel, Bernd Freisleben

  2. OutLine • Introduction • Protocol • Implementation Issues • Experimental Results • Conclusions

  3. 1 Introduction • 目前(GSM(第二代)和UMTS(3G) )的加密方式: • 手機送出加密文件給基地台在基地台發送給目的端

  4. 常見的攻擊方式: 1 Introduction

  5. 2 Protocol • The identity-based key agreement protocol SSF (Secure Session Framework) consists of four main algorithms: Setup, Extract, Build SIK, and Compute. • ID-PKG

  6. 2 Protocol 2.2 Key Agreement

  7. 2 Protocol 2.2 Key Agreement

  8. 2 Protocol 2.2 Key Agreement

  9. 2 Protocol 2.2 Key Agreement

  10. 2 Protocol 2.3 Key Agreement Between Domains

  11. 2 Protocol 2.3 Key Agreement Between Domains

  12. 2 Protocol

  13. 3 Implementation Issues • 3.2 Distribution of the Identity Keys • IBEs & PKIs • 3.3 Key Expiration • Mobile phone call encryption is the fact that telephone numbers are reused.

  14. 4 Experimental Results • Nokia N82-1 and a Nokia N95-1 both with an ARM-11 CPU with 330 MHz running Symbian 9.2 FP1. • N = 512, 1024, 2048 and 4096 Bit • rID = 64, 128, 256 and 512 Bit • R = f3, 17, 513, 65537g

  15. 4 Experimental Results

  16. 6 Conclusions • An identity-based key agreement system for mobile telephony in GSM and UMTS networks was presented. • Experimental results based on a Symbian implementation for the Nokia smartphones N95-1 and N82-1 were presented showing that current smartphones are powerful enough to run the presented system.

More Related