City Research Online

User dependent cryptography for security in future mobile telecommunication systems

Sabouri, A., Komninos, N. & Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, 1, pp. 422-427. doi: 10.1109/cts.2011.5898962

Abstract

In this paper we propose a user dependent scheme for enhancing security of the transmitted content in the future telecommunication systems. In order to achieve a higher level of security we introduce a scheme where the user identity gets involved in the encryption/decryption processes using an additional component for the block cipher which represents the user’s behavioural model. Applying such a scheme, in addition to introducing more difficulties to an attacker due to the user dependency of the cipher algorithm, gives the mobile operator the opportunity to ensure that a licensed service has not been shared by the customer. To show the feasibility of our approach we use the concept of invertible Boolean functions as an example.

Publication Type: Article
Additional Information: © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
Publisher Keywords: Behavioral model box, user dependent cryptography
Subjects: Q Science > QA Mathematics > QA76 Computer software
Departments: School of Policy & Global Affairs > Economics > Discussion Paper Series
School of Science & Technology > Computer Science > Software Reliability
SWORD Depositor:
[thumbnail of User Dependent Cryptography for Security.pdf]
Preview
PDF
Download (258kB) | Preview

Export

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login