Skip to main content

Security services for telecommunications users

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 998))

Abstract

The Pan-European RACE II project Mobilise develops and demonstrates the Personal Services Communication Space (PSCS) as an approach for the deployment of personalised, mobile communication services based on Intelligent Network (IN) techniques.

This paper discusses — after an introduction to end-to-end security service requirements — the security architecture of the PSCS demonstrator. It gives examples how these requirements can be met by using existing demonstrator features.

A Public Key Cryptosystem (PKCS) using the RSA encryption algorithm is used for the mutual authentication between communication partners in the PSCS system. Available smart card technology is used for the secure storage of private and certified public keys, personal data, and for the processing of cryptographical functions needed by the PKCS.

A security architecture including a certification hierarchy and a suitable protocol for the mutual authentication has been implemented according to existing standards (X.509 [1], ASN.1 [2] [3], PKCS#1 [4]). The performance of the system has been evaluated in detail and examples for the provisioning of end-to-end security services are given.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ITU-T. Recommendation X.509 The Directory — Authentication Framework. The International Telegraph and Telephone Consultative Committee, Melbourne, November 1988.

    Google Scholar 

  2. ITU-T. Recommendation X.208 Specification of Abstract Syntax Notation One (ASN.1). The International Telegraph and Telephone Consultative Committee, Melbourne, November 1988.

    Google Scholar 

  3. Burton S. Kalinski. A Layman's Guide to a Subset of ASN.1, BER, and DER. RSA Laboratories Technical Note (URL: ftp://ftp.rsa.com/pub/pkcs), RSA Data Security, Inc., November 1993.

    Google Scholar 

  4. RSA Laboratories. PKCS#1: RSA Encryption Standard. RSA Laboratories Technical Note Version 1.5, RSA Data Security, Inc., November 1993.

    Google Scholar 

  5. Mobilise. PSCS Security, Network and Access Aspects, volume I. Deliverable 23, Race Project R2003, December 1993.

    Google Scholar 

  6. Ronald L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communication of the ACM, 31(2):120–126, February 1978.

    Google Scholar 

  7. FIPS PUB 180-1. Secure Hash Standard. Federal Information Processing Standards Publication (FIPS PUB) Category: Computer Security, U.S. Department of Commerce/National Institute of Standards and Technology (NIST), April 1995.

    Google Scholar 

  8. Donald E. Knuth. Seminumerical Algorithms, volume II of The Art of Computer Programming. Addison-Wesley, Reading, Mas., 2nd edition, 1981.

    Google Scholar 

  9. CCITT. Functional Specification and Description Language (SDL). Criteria for using Formal Description Techniques (FDTs). Recommendation Z.100, volume X — Fascicle X.1 of Blue Book. The International Telegraph and Telephone Consultative Committee (CCITT), Geneva, 1989.

    Google Scholar 

  10. D. Maillot, J. Ølnes, and P. Spilling. In service security and service management security and their relationships — using upt as a case study. In Towards a Pan-European Telecommunication Service Infrastructure — IS&N'94, pages 513–524. Springer, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Anne Clarke Mario Campolargo Nikos Karatzas

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Popp, R., Fröhlich, M., Jefferies, N. (1995). Security services for telecommunications users. In: Clarke, A., Campolargo, M., Karatzas, N. (eds) Bringing Telecommunication Services to the People — IS&N '95. IS&N 1995. Lecture Notes in Computer Science, vol 998. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0016954

Download citation

  • DOI: https://doi.org/10.1007/BFb0016954

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60479-2

  • Online ISBN: 978-3-540-47618-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics