For data security in a digital telecommunication system having a plurality
of subscriber equipment, a public key is respectively calculated from a
secret key prescribed in a first subscriber equipment. This public key is
communicated to a second subscriber equipment that it participates with in
a connection with the subscriber equipment being used in this second
subscriber equipment for encoding secondary key information for matching
the first subscriber equipment to transmission modalities that are
repeatedly modified and that are provided in the second subscriber
equipment for the first subscriber equipment. The subscriber equipment can
calculate new keys from time to time. The initial settings of scramblers
can be modified as transmission modalities.
Other References
"Kryptografie in der Telematik", ntz Sonderheft ISDN-Kommunikationsanlogen
vol. 38 (1985) No. 9, pp. 636-638.
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems",
R. L. Rivest et al, Communications of the ACM, vol. 21, No. 2, Feb. 1978,
pp. 120-126.
"A Broadband Subscriber Network Using Optical Star Couplers", Tokura et al,
IEEE/IEICE Global Telecommunications Conf. (1987), pp. 1439-1443).
"Implementation of a TDM Passive Optical Network for Subscriber Loop
Applications", IEEE Journal of Lightwave Technology, vol. 7, No. 11, Nov.
1989, pp. 1752-1785.
|