By Topic

IEEE Journal on Selected Areas in Communications

Issue 5 • Jun 1993

Filter Results

Displaying Results 1 - 19 of 19
  • An implementation of elliptic curve cryptosystems over F2155

    Publication Year: 1993, Page(s):804 - 813
    Cited by:  Papers (71)  |  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    The authors describe a VLSI Galois field processor and how it can be applied to the implementation of elliptic curve groups. They demonstrate the feasibility of constructing very fast, and very secure, public key systems with a relatively simple device, and the possibility of putting such a system on a smart card. The registers necessary to implement the elliptic curve system will require less tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Immunizing public key cryptosystems against chosen ciphertext attacks

    Publication Year: 1993, Page(s):715 - 724
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB)

    Three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks are presented. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertext except for the exact object ciphertext to be cryptanalyzed. The first strengthening method is based on the use of one-way hash functio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure data transmission in extended Ethernet environments

    Publication Year: 1993, Page(s):794 - 803
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB)

    An extended Ethernet LAN is built by connecting several Ethernet segments by means of suitable devices (repeaters, bridges, etc.). A common way to make this interconnection is through a main segment, called the backbone, that joins each of the departments (or, perhaps, building floors) within the owner premises. In this kind of network, data transmission in the backbone is very sensitive to either... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ID-based cryptographic schemes for user identification, digital signature, and key distribution

    Publication Year: 1993, Page(s):757 - 760
    Cited by:  Papers (17)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    In 1984, A. Shamir introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify himself before joining a communication network. Once a user is accepted, the KAC will provide him with a secret key. In this way, if a user wants to communicate with others, he or she only needs to know the identity of his communicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LPI in pulsed laser space communications

    Publication Year: 1993, Page(s):673 - 678
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    A basic low-probability of intercept (LPI) study for a pulsed-laser pulse position modulated (PPM) optical link with a colocated direct detection intercepting receiver is presented. The latter is considered to be a form of optical radiometer using continuous threshold testing to detect the presence of the transmitting laser. The various design alternatives for the coded PPM link, and their effect ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure communications by optical homodyne

    Publication Year: 1993, Page(s):770 - 777
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    It is shown that optical homodyne techniques offer a family of schemes for secure communications. Following some background in secure optical communications, a particular scheme is described and compared to cryptography. The scrambler built is also described, and security is discussed. Experimental results for point-to-point links in single-mode polarization-maintaining fibers are presented. Vario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method for analyzing the security of cryptographic protocols

    Publication Year: 1993, Page(s):702 - 714
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1192 KB)

    A formal method for analyzing the security of cryptographic protocols is presented. This method is based on an original representation of the participants' knowledge. The author proves the probabilistic properties of the cryptographic protocols and models the possible attacks on these protocols. This method is applied to well-known protocols like the Kerberos authentication protocol and the X.509 ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Principles of key management

    Publication Year: 1993, Page(s):785 - 793
    Cited by:  Papers (22)  |  Patents (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    Security services based on cryptographic mechanisms assume keys to be distributed prior to secure communications. The secure management of these keys is one of the most critical elements when integrating cryptographic functions into a system, since any security concept will be ineffective if the key management is weak. This work approaches the problem of key management in a modular and hierarchica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing secure communications with multilevel security and restricted character set translation

    Publication Year: 1993, Page(s):745 - 756
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1020 KB)

    It has been shown that a source file can be translated using a restricted character set. US Naval message traffic is transmitted with a restricted character set, and the files are optionally compressed. Both character translation and data compression can be used as add-on data encryption. Various schemes of restricted character set translation have been investigated and their implementations on co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple ID-based scheme for key sharing

    Publication Year: 1993, Page(s):730 - 734
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    A noninteractive ID-based key sharing scheme based on a method of iterative elimination of additive random numbers is proposed. With this method, a common key is generated step by step, leaving no opportunity for conspiracy attacks. The integrity of the scheme is discussed, and a method for improving computational efficiency is proposed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security analysis of the INTELSAT VI and VII command network

    Publication Year: 1993, Page(s):663 - 672
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    Some results of a study of the command security issues associated with the INTELSAT VI and VII satellites are reported. The configuration and protocols of the INTELSAT command system are briefly described. Three possible configurations for connecting the INTELSAT headquarters and the telemetry, tracking, and command (TTC) stations are distinguished, and a layered architecture is introduced to illu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security architectures using formal methods

    Publication Year: 1993, Page(s):694 - 701
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    A model describing secure communications architectures is developed using the formal language Z. The model is based on fundamental cryptographic properties. Some basic constraints are derived for the design of secure architectures which allow problems to be identified prior to the design of security protocols. A simple criterion is derived for ensuring that all pairs of users can set up secure com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Double-precision modular multiplication based on a single-precision modular multiplier and a standard CPU

    Publication Year: 1993, Page(s):761 - 769
    Cited by:  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The author considers the case where double-precision modular multiplications need to be performed by a device containing a custom IC that provides for a single-precision modular multiplication. The method presented is obviously extended to multiplying (k×n )-bit operands using an n-bit modular multiplier, for the case where k is a power of 2. Whereas multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic design of a family of attack-resistant authentication protocols

    Publication Year: 1993, Page(s):679 - 693
    Cited by:  Papers (63)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1284 KB)

    Most existing designs for two-way cryptographic authentication protocols suffer from one or more limitations. Among other things, they require synchronization of local clocks, they are subject to export restrictions because of the way they use cryptographic functions, and they are not amenable to use in lower layers of network protocols because of the size and complexity of messages they use. Desi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast server-aided secret computation protocols for modular exponentiation

    Publication Year: 1993, Page(s):778 - 784
    Cited by:  Papers (19)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Four efficient server-aided computation protocols for the modular exponentiation operation are proposed. The server-aided computation protocol is a two-party protocol between the client and the server. This protocol has two objectives. The first is to allow the client to borrow the computational power from the server to reduce the computation time. Note that the server is powerful, but restricted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting poorly chosen secrets from guessing attacks

    Publication Year: 1993, Page(s):648 - 656
    Cited by:  Papers (133)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (980 KB)

    In a security system that allows people to choose their own passwords, people tend to choose passwords that can be easily guessed. This weakness exists in practically all widely used systems. Instead of forcing users to choose secrets that are likely to be difficult for them to remember, solutions that maintain user convenience and a high level of security at the same time are proposed. The basic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and cryptanalysis of transform-based analog speech scramblers

    Publication Year: 1993, Page(s):735 - 744
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    Four discrete orthogonal transforms have been evaluated for their suitability for use in transform-based analog speech encryption. Subjective as well as objective tests were conducted to compare the residual intelligibility and the recovered speech quality under channel conditions. The cryptanalytic strengths of the schemes were then compared by applying a novel cryptanalytic attack which exploits... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new generalized group-oriented cryptoscheme without trusted centers

    Publication Year: 1993, Page(s):725 - 729
    Cited by:  Papers (28)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The authors first define the concept of a generalized group-oriented cryptosystem. Based on the generalized secret-sharing scheme proposed by H.Y. Lin and L. Harn (1991), they present a noninteractive approach for realizing such a group-oriented cryptosystem. There are three advantages to the approach: it does not need any trusted clerk or center to distribute the messages to the recipients in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing availability and security of an authentication service

    Publication Year: 1993, Page(s):657 - 662
    Cited by:  Papers (45)  |  Patents (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    Authentication, the process by which one satisfies another about one's claim of identity, is typically provided by an authentication server via an authentication protocol. Compromise of the authentication service can lead to the compromise of the whole system, and the service is a performance bottleneck because many activities cannot proceed unless the identities of concerned parties can be satisf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Journal on Selected Areas in Communications focuses on all telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Muriel Médard
MIT