Security planning for digital modbile communications

디지털 이동 통신을 위한 안전 대책

  • Published : 1996.03.01


This paper deals with the security planning for digital mobile communications provided in CDMA and GSM security standards and the public key crytosystem security methods. In this paper, we provide a comparison of these methods with repect to security services and key managment. Based upon this analysis, we also present a secunity planning which is applicable to the domestic digital mobile communications.

본 논문에서는 미국의 EIA/TIA의 표준인 CDMA 관련 security와 유럽의 ETSI의 표준인 GSM 관련 security 그리고 공개키 암호 방식을 이용한 security방식들에서 제공되는 디지털 이동 통신을 위한 안전 대책들을 다루고자한다. 이들 각 방식들에 대하여, 통신 사업자가 고려하여야 하는 security 서비스 그리고 키 관리 방안들을 중심으로 한 비교 분석을 하고자 한다. 이러한 분석을 토대로 하여 국내 디지털 이동 통신에 적용가능한 체계적인 안전 대책을 제안한다.



  1. NewBytes News Service Cellular One's Fraud Protection for New Customers
  2. 동아일보 뉴욕 도둑전화 비상 동아일보
  3. Cellular Radiotelecommunications Intersystem Operations:Authentications, Signaling Message Encryption and Voice Privacy v.TSB51 TIA/EIA Telecommunications Systems Bulletin
  4. European Digital Cellular Telecommunications Systems(Phase1);GSM 3.20, Security Related Newwork Functions, Version 3.3.2 European Telecommunications Standards Institute(ETSI)
  5. Final Draft, ETS 300 175-7, DECT, Common interface, Part 7:Security features European Telecommunication Standard ETSI-RES
  6. Computer Security and Industrial Cryptography, ESAT Course Security Aspects of Mobile Communications K. Vedder
  7. CompEuro'92 Security in Mobile and Cordless Telecommunications M. Walker
  8. Int'. conf. on selected Topics in Wireless Com. Cryptographic Security Techniques for Digital Mobile Telephones J. C. Cooke;R. L. Brewster
  9. 1st ACM conf. Computer and Communication Security Security Planning for Personal Communication D. Brown
  10. Proc. 43rd. IEEE VT conf. Authentication and Encryption in a Mobile Communication System R. Akiyama;S. Sasaki
  11. 한국통신정보보호학회지 v.3 no.4 GSM시스템의 Security 특성에 관한 고찰 오현서;이홍섭;이대기
  12. U.S. Department of Commerce, Data Encryption Standard, Federal Information Processing Standards Publications 46-1 FIPS Pub. 46-1
  13. Advances in Cryptology, Proceedings of Eurocrypt'87 Fast Data Encipherment Algorithm FEAL A. Shimizu;S. Miyaguchi
  14. TTA Interim Standard;800MHz대 디지털 이동 전화 무선 인터페이스, 제1판 한국통신기술협회
  15. IEEE Trans. Inform. Theory v.22 New Directions in Cryptography W. Diffie;M. Hellman
  16. Advances in Cryptology, Proceedings of Crypto'89 Dey Distribution Protocol for Digital Mobile Communication Systems M. Tatebayashi;N. Matsuzaki;D. B. Newman
  17. IEEE Global Telecommunications Conference Privacy and Authentication on a Portable Communications System M. J. Beller;L. Chang;Y. Yacobi
  18. Advances in Cryptology, Proceedings of Eurocrypt'93 On Dey Distribution and Authentication in Mobile Radio Networks C. S. Park;K. Kaoru;T. Okamoto;S. Tsujii
  19. Information Procesing Letters v.48 Scheme for Secure Digital Mobile Communications based on Symmetric Key Cryptography T. Hwang
  20. Communications fo the Association for Computing Machinery v.21 no.2 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R. L. Rivest;A. Shamir;L. Adleman
  21. Journal of Cryptology v.7 no.2 Proof of Soundness(Integrity) of Cryptographics Protocols G. J. Simmons
  22. MIT Lab. for Computer Science v.TR.212 Digitalized Signatures and Public Key Functions as Intractable as Factorization M. O. Rabin
  23. Communications of the ACM v.24 no.2 Untraceable Electronic Mail, Return Address, and Digital Pseudonyms D. Chaum
  24. Advances in Cryptology, Eurocrypt'93 Efficient Anonymous Channel and All/Nothing Election Scheme C. S. Park;K. Itoh;K. Kurosawa
  25. Proceedings of IEEE Symposium on Security and Privacy Preserving Privacy in a Network of Mobile Computers D. A. Cooper;K. P. Birman
  26. Technical Report of IEICE, IT93-64 Schemes of Anonymous Channel on Communication Networks S. Houmura;R. Sakai;M. Kasahara
  27. Journal of CRYPTOLOGY v.5 no.2 A Cubic RSA Code Equivalent to Factorization J. H. L. Loxton;D. S. P. Khoo;G. J. Bird;J. Seberry
  28. Advances in Cryptology, Proceedings of Crypto'90 Differential Cryptanalysis of DES-like Cryptosystems E. Biham;A. Shamir
  29. Advances in Cryptology, Proceedings of Eurocrypt'93 Linear Cryptanalysis Method for DES Cipher M. Matsui