Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1

End-to-end encryption Related Abstracts

1 Security Analysis of SIMSec Protocol

Authors: Vedat Coskun, Kerem Ok, Busra Ozdenizci, Cem Cevikbas, Mohammed Alsadi

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: smart card, key exchange, End-to-end encryption, SIM card

Procedia PDF Downloads 138