Abstract
Authors are dealing with the problem of the on-line key management system (KMS) solution, needed to ensure, using cryptographic tools, the authentication of communicated entities of stationary and mobile parts of ETCS (European Train Control System) level 2 (L2). Different approaches to this solution are described on the basis of a symmetric and an asymmetric cryptography. The main part of paper presents a proposal of KMS solution for ETCS L2 based on an asymmetric cryptographic algorithm ECC (Elliptic Curve Cryptography) oriented towards a solution of domain′s parameters selection and the identification of particular entities in the train traffic. A practical generation of a pair of keys is carried out via a SW tool Cryptool.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Architecture of ERTMS, http://www.ertms.com/architecture.html (date of access 2010)
Zahradník, J., et al: Application of ETCS and GSM-R in conditions of Slovak Railways. Contract. Customer: Railways of Slovak Republic (2006)
Dohnalík, B.: Purposes of Railway of Slovak Republic in area of ERTMS/ETCS applications. In: International Conference Applications of ERTMS/ETCS in Czech Republic, Pardubice (2004)
FIPS PUB 171, Key management using ANSI X9.17, National Institute of Standards and Technology (1992)
ANSI X9.17 (Revised), American National Standard for Financial Institution Key Management (Wholesale), American Bankers Association (1995)
Lenstra, A., Verheul, E.: Selecting Cryptographic Key Sizes in Commercial Applications. PricewaterhouseCoopers Cryptographic Centre of Excellence (CCE) Quarterly Journal (1999)
EN 50159: Railway applications. Communication, signalling and processing systems Safety-related communication in transmission systems. CENELEC (2010)
UNISIG Subset 038 v2.1.9. Off line key management FIS (2005)
Nadeem, A., Col: A Performance Comparison of Data Encryption Algorithms. IEEE (2005)
Abdul Kader, H.M., et al.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security 8(12) (December 2008)
Hirani, S.: Energy Consumption of Encryption Schemes in Wireless Devices. University of Pittsburgh (2003)
Sachin, M., Kumar, D.: Implementation and Analysis of AES, DES and Triple DES on GSM Network. IJCSNS International Journal of Computer Science and Network Security 10(1) (2010)
Enge, A.: Elliptic Curves and Their Applications to Cryptography – An Introduction. Kluwer Academic Publisher, Boston (2001) ISBN 0-7923-8589-6
Cohen, H., Frey, G.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall/CRC (2005) ISBN: 1-5848-8518-1
FIPS 186-3: Digital Signature Standard (DSS), National Institute of Standards and Technology (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Franeková, M., Výrostko, M. (2012). Approaches to a Solution of Key Management System for Cryptography Communications within Railway Applications. In: Mikulski, J. (eds) Telematics in the Transport Environment. TST 2012. Communications in Computer and Information Science, vol 329. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34050-5_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-34050-5_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34049-9
Online ISBN: 978-3-642-34050-5
eBook Packages: Computer ScienceComputer Science (R0)