Approaches to a Solution of Key Management System for Cryptography Communications within Railway Applications

  • Mária Franeková
  • Marek Výrostko
Part of the Communications in Computer and Information Science book series (CCIS, volume 329)


Authors are dealing with the problem of the on-line key management system (KMS) solution, needed to ensure, using cryptographic tools, the authentication of communicated entities of stationary and mobile parts of ETCS (European Train Control System) level 2 (L2). Different approaches to this solution are described on the basis of a symmetric and an asymmetric cryptography. The main part of paper presents a proposal of KMS solution for ETCS L2 based on an asymmetric cryptographic algorithm ECC (Elliptic Curve Cryptography) oriented towards a solution of domains parameters selection and the identification of particular entities in the train traffic. A practical generation of a pair of keys is carried out via a SW tool Cryptool.


key management system symmetric cryptography asymmetric cryptography Advanced Encryption Standard Elliptic curve cryptography ETCS key generation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Architecture of ERTMS, (date of access 2010)
  2. 2.
    Zahradník, J., et al: Application of ETCS and GSM-R in conditions of Slovak Railways. Contract. Customer: Railways of Slovak Republic (2006) Google Scholar
  3. 3.
    Dohnalík, B.: Purposes of Railway of Slovak Republic in area of ERTMS/ETCS applications. In: International Conference Applications of ERTMS/ETCS in Czech Republic, Pardubice (2004)Google Scholar
  4. 4.
    FIPS PUB 171, Key management using ANSI X9.17, National Institute of Standards and Technology (1992)Google Scholar
  5. 5.
    ANSI X9.17 (Revised), American National Standard for Financial Institution Key Management (Wholesale), American Bankers Association (1995)Google Scholar
  6. 6.
    Lenstra, A., Verheul, E.: Selecting Cryptographic Key Sizes in Commercial Applications. PricewaterhouseCoopers Cryptographic Centre of Excellence (CCE) Quarterly Journal (1999)Google Scholar
  7. 7.
    EN 50159: Railway applications. Communication, signalling and processing systems Safety-related communication in transmission systems. CENELEC (2010)Google Scholar
  8. 8.
    UNISIG Subset 038 v2.1.9. Off line key management FIS (2005)Google Scholar
  9. 9.
    Nadeem, A., Col: A Performance Comparison of Data Encryption Algorithms. IEEE (2005)Google Scholar
  10. 10.
    Abdul Kader, H.M., et al.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security 8(12) (December 2008)Google Scholar
  11. 11.
    Hirani, S.: Energy Consumption of Encryption Schemes in Wireless Devices. University of Pittsburgh (2003)Google Scholar
  12. 12.
    Sachin, M., Kumar, D.: Implementation and Analysis of AES, DES and Triple DES on GSM Network. IJCSNS International Journal of Computer Science and Network Security 10(1) (2010)Google Scholar
  13. 13.
    Enge, A.: Elliptic Curves and Their Applications to Cryptography – An Introduction. Kluwer Academic Publisher, Boston (2001) ISBN 0-7923-8589-6 Google Scholar
  14. 14.
    Cohen, H., Frey, G.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall/CRC (2005) ISBN: 1-5848-8518-1 Google Scholar
  15. 15.
    FIPS 186-3: Digital Signature Standard (DSS), National Institute of Standards and Technology (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Mária Franeková
    • 1
  • Marek Výrostko
    • 1
  1. 1.Faculty of Electrical EngineeringUniversity of ŽilinaŽilinaSlovakia

Personalised recommendations