Giải pháp bảo mật đầu cuối cho điện thoại di động
Abstract - In this paper, on the background of researching technological solutions to design and manufacture security mobile phones in the world, the authors synthesized and introduced the trend of developing security technologies for mobile devices, simultaneously explain the challenges posed in the design and manufacture of mobile phones security, propose design and manufacturing models to ensure optimization based on End-To-End Encryption solution. The proposed model has been applied in designing and manufacturing 01 type of security feature phone.
TÀI LIỆU THAM KHẢO [1]. Tatsuro Murakami, “The NGN - a carrier-grade IP convergence network”, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, 2010. [2]. Sklavos N, Koupopavlou O. Architectures and VLSI Implementations of the AES-Proposal Rijndael[J]. Computers, IEEE Transactions on, 2002, 51(12):1454-1459 [3]. R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, Feb. 1978, 21(2): 120-126. [4]. J.-H. Hong, RSA Public Key Crypto-Processor Core Design and Hierarchical System Test Using IEEE 1149 Family, Ph.D. dissertation, Dept. Elect. Eng., National Tsing Hua Univ., Hsinchu, Taiwan R.O.C., 2000: 322-334. [5]. S. Bruce, "Description of a new variable-length key, 64-bit block cipher (Blowfish),"In Fast Software Encryption Second International Workshop, Leuven, Belgium, December 1993, Proceedings, Springer-Verlag, ISBN: 3-540-58108-1, pp.191-204, 1994. [6]. K. Russell Meyers, and H. Ahmed Desoky, "An implementation of the Blowfish cryptosystem," Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, Sarajevo, Bosnia and Herzegovina, pp. 346-351, December 16-19, 2008. [7]. M.Allam,"Data encryption performance based on Blowfish," 47th International Symposium ELMAR, Zadar, Croatia, 2005, pp. 131-134.. [8]. Diffie, Whitfield; Hellman, Martin E. (November 1976). "New Directions in Cryptography" (PDF). IEEE Transactions on Information Theory. 22 (6): 644–654. [9]. S. Williams, "IrDA: past present and future", IEEE Pers. Commun., vol. 7, no. 1, pp. 11-19, Feb. 2000. [10]. Yingying Yang; Qingxin Chu; Chunxu Mao, " Multiband MIMO Antenna for GSM, DCS, and LTE Indoor Applications " IEEE Antennas and Wireless Propagation Letters, pp. 1573 - 1576, 12 January 2016. [11]. ITU-T Recommendation P.862. Perceptual Evaluation of Speech Quality (PESQ), An Objective Method for End-to-end Speech Quality Assessment of Narrowband Telephone Networks and Speech Codecs. |
Thông tin trích dẫn: TS. Trần Văn Khánh, KS. Nguyễn Thành Vinh, “Giải pháp bảo mật đầu cuối cho điện thoại di động”, Nghiên cứu khoa học và công nghệ trong lĩnh vực An toàn thông tin, Tạp chí An toàn thông tin, Vol. 09, pp. 37-48, No. 01, 2019.
TS. Trần Văn Khánh, KS. Nguyễn Thành Vinh