Building on Existing Security Infrastructures
- When?
- Wednesday 18 May 2011, 15:00 to 16:00
- Where?
- 39BB02
- Open to:
- Staff, Students
- Speaker:
- Professor Chris Mitchell, Royal Holloway
Professor Chris Mitchell, from Royal Holloway, will be our next speaker.
Almost any large scale network security system requires the establishment of a security infrastructure of some kind. For example, if network authentication or authenticated key establishment is to be implemented, then the communicating parties need access to a shared secret key or certificates for each other's public keys. Setting up a new security infrastructure for a significant number of clients is by no means a trivial task. It is therefore tempting to try to exploit an existing security infrastructure to avoid the need for the potentially costly roll-out of a new infrastructure.
The GAA architecture has been designed to enable the pre-existing mobile telephony security infrastructure to be exploited for the provision of generic security services. We propose the adoption of the architecture used by GAA to enable a wide range of other pre-existing infrastructures to be similarly exploited. We briefly look at two examples, namely what we refer to as TC-GAA and EMV-GAA.
Prof Mitchell's bio can be found here

