Skip to main content

Security Upgrade of Existing ISDN Devices by Using Reconfigurable Logic

  • Conference paper
  • First Online:
Book cover Field-Programmable Logic and Applications: The Roadmap to Reconfigurable Computing (FPL 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1896))

Included in the following conference series:

  • 615 Accesses

Abstract

Integrated Services Digital Network (ISDN) is a de facto worldwide standard for wired digital telephony. Since ISDN was developed in 1984 as a public network it does not support modern sophisticated fraud detection systems. Indeed most current installations of ISDN are incapable of supporting encrypted transmission. Securing user information is therefore normally done outside the ISDN communication environment. In this paper we present our experience in using reconfigurable logic for securing existing ISDN devices against intruders in point to point communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Rivest, R.L., Shamir, A., Adleman, L.: A Method of obtaining digital signature and public key cryptosystems, Comm. Of ACM, Vol. 21, No. 2, pp. 120–146, Feb. 1978

    Article  MATH  MathSciNet  Google Scholar 

  • Montgomery, P.L.: Modular Multiplication without Trial Division, Mathematics of Computation, Vol. 44, No. 170, pp. 519–521, 1985.

    Article  MATH  MathSciNet  Google Scholar 

  • Dusse, S.R, Kaliski Jr., B.S.: A Cryptographic Library for the Motorola DSP56000, Advances in Cryptology-Eurpcrypt’90 (LNCS 473), pp. 230–244, 1991.

    Google Scholar 

  • Ploog, H., Timmermann, D.: On Multiple Precision Based Montgomery Multiplication without Precomputation of N’ 0 = N 0 -1 mod W, accepted for presentation ICCD 2000

    Google Scholar 

  • National Bureau of Standards FIPS Publication 46: DES modes of operation, 1977

    Google Scholar 

  • Wienke, C.: Hardwareoptimale Implementierung der Montgomery-Multiplikation, University of Rostock, student work (in german), 1999 http://www.rsasecurity.com/rsalabs/des3/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ploog, H., Schmalisch, M., Timmermann, D. (2000). Security Upgrade of Existing ISDN Devices by Using Reconfigurable Logic. In: Hartenstein, R.W., Grünbacher, H. (eds) Field-Programmable Logic and Applications: The Roadmap to Reconfigurable Computing. FPL 2000. Lecture Notes in Computer Science, vol 1896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44614-1_55

Download citation

  • DOI: https://doi.org/10.1007/3-540-44614-1_55

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67899-1

  • Online ISBN: 978-3-540-44614-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics