{"title":"ISDN的安全通信程序","authors":"G. Claassen, G. Kuhn","doi":"10.1109/COMSIG.1988.49322","DOIUrl":null,"url":null,"abstract":"An overview of the basic concepts of encryption is given and a key distribution problem is analyzed that arises when encryption is implemented as the basis of security services in communication networks. A secure communications procedure based on a hybrid encryption system and an adaptive version of the proposed strong three-way authentication method of the CCITT and ISO is described for solving the problem of distributing encryption and decryption keys. The most important advantage of this procedure is that the user need only to approach a trusted third party once, when joining the network. In the hybrid system, a public-key algorithm is used to distribute secrete keys over the network which are then used as the keys for a conventional system to encrypt the data messages. The integration of the secure communication procedure in ISDN to perform key distribution in association with a circuit-switched connection is also described.<<ETX>>","PeriodicalId":339020,"journal":{"name":"COMSIG 88@m_Southern African Conference on Communications and Signal Processing. Proceedings","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Secure communication procedure for ISDN\",\"authors\":\"G. Claassen, G. Kuhn\",\"doi\":\"10.1109/COMSIG.1988.49322\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An overview of the basic concepts of encryption is given and a key distribution problem is analyzed that arises when encryption is implemented as the basis of security services in communication networks. A secure communications procedure based on a hybrid encryption system and an adaptive version of the proposed strong three-way authentication method of the CCITT and ISO is described for solving the problem of distributing encryption and decryption keys. The most important advantage of this procedure is that the user need only to approach a trusted third party once, when joining the network. In the hybrid system, a public-key algorithm is used to distribute secrete keys over the network which are then used as the keys for a conventional system to encrypt the data messages. The integration of the secure communication procedure in ISDN to perform key distribution in association with a circuit-switched connection is also described.<<ETX>>\",\"PeriodicalId\":339020,\"journal\":{\"name\":\"COMSIG 88@m_Southern African Conference on Communications and Signal Processing. Proceedings\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1988-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"COMSIG 88@m_Southern African Conference on Communications and Signal Processing. Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSIG.1988.49322\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"COMSIG 88@m_Southern African Conference on Communications and Signal Processing. Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSIG.1988.49322","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An overview of the basic concepts of encryption is given and a key distribution problem is analyzed that arises when encryption is implemented as the basis of security services in communication networks. A secure communications procedure based on a hybrid encryption system and an adaptive version of the proposed strong three-way authentication method of the CCITT and ISO is described for solving the problem of distributing encryption and decryption keys. The most important advantage of this procedure is that the user need only to approach a trusted third party once, when joining the network. In the hybrid system, a public-key algorithm is used to distribute secrete keys over the network which are then used as the keys for a conventional system to encrypt the data messages. The integration of the secure communication procedure in ISDN to perform key distribution in association with a circuit-switched connection is also described.<>