User dependent cryptography for security in future mobile telecommunication systems

Sabouri, A., Komninos, N. & Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, pp. 422-427. doi: 10.1109/CTS.2011.5898962

[img]
Preview
PDF
Download (258kB) | Preview

Abstract

In this paper we propose a user dependent scheme for enhancing security of the transmitted content in the future telecommunication systems. In order to achieve a higher level of security we introduce a scheme where the user identity gets involved in the encryption/decryption processes using an additional component for the block cipher which represents the user’s behavioural model. Applying such a scheme, in addition to introducing more difficulties to an attacker due to the user dependency of the cipher algorithm, gives the mobile operator the opportunity to ensure that a licensed service has not been shared by the customer. To show the feasibility of our approach we use the concept of invertible Boolean functions as an example.

Item Type: Article
Additional Information: © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
Uncontrolled Keywords: Behavioral model box, user dependent cryptography
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: School of Social Sciences > Department of Economics > Department of Economics Discussion Paper Series
School of Informatics > Centre for Software Reliability
URI: http://openaccess.city.ac.uk/id/eprint/2488

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics