"Najlepszą metodą przewidywania przyszłości jest jej tworzenie" - Peter Drucker   

Główne Menu


Strona Główna


PSTT
· O Stowarzyszeniu
· Wydarzenia
· Statut


Redakcja wortalu
· O Nas
· Kontakt

Artykuły
· Telematics
· Transport

Inne
· Słownik telematyczny
· Konferencje
· Polecamy
· Do pobrania
· FAQ

Partnerstwo


Szukaj


Artykuły :: Telematics :: ATST

Key Management System in ETCS
M. FRANEKOVÁ, P. CHRTIANSKY
2010-01-05 10:01:36

Title:

Key Management System in ECTS

Authors:

M. FRANEKOVÁ(a), P. CHRTIANSKY(b)

Afiliation:

(a) Faculty of Electrical Engineering, University of Žilina, Univerzitnå 1, 01026 Žilina, Slovakia,
(b) Tempest, a. s., PlynĂĄrenskĂĄ 7/B, 821 09 Bratislava, Slovakia

Keywords:

mobile communications, open transmission system, key management system, radio block centre, key management centre,  on board unit, brute force attack, birthday paradox

Abstract:

The paper deals with problems of KMS (Key Management System), which is developed in mobile communications GSM-R (Global System Mobile for Railway) recommended within the European Train Control System (ETCS), through the Euroradio system. The main part is oriented to safety procedures description of off-line KMS system between communication entities of ETCS system. In the experimental part the results of computational safety of modified DES algorithm are summarised using special brute force attack to key – birthday paradox

Bibliography:

[1] UIC EIRENE SRS: System Requirements Specification, 2006, PSA167D006-15
[2] UIC EIRENE FRS: Functional Requirements Specification, 2006, PSA167D005-7
[3] ZÁHRADNÍK J. - RÁSTOČNÝ K.: Applications of interlocking systems, EDIS, ŽU Žilina, 2006, ISBN 80-8070-546-1
[4] EN  50159-2: Railway applications – Communication, signalling and processing systems. Part 2: Safety-related communication in open transmission systems, 1998
[5] Subset-038: Off-line Key Management FIS, 2005, v 2.1.9
[6] Subset-037: Euroradio FIS, 2005, v2.2.5, rev. G
[7] FIS between trackside sub-systems, Safe application service, version 8_0, 2002
[8] STALLINGS W.: Cryptography and Network  Security, Prentice Hall, New Yersey, 2003
[9] BIHAM E.: How to Forge DES-Encrypted Messages in 228 Steps, Technical Report, Department of Computer Science, Technion, Haifa, 1996, CS 884

Logowanie

Użytkownik

Hasło


Załóż konto

Zapomniałem hasła

Nowe artykuły


Ankieta




Ogółem głosów: 0

Wyniki poprzednich ankiet


©NET-DESIGN 2007