Abstract
We present a new 2-pass authentication and key agreement protocol for mobile communications. The protocol solves the weaknesses of the PACS and Zheng’s 1.5-move protocol for air-interface of mobile systems. The paper outlines the new protocol, examines its various aspects, and compares them to those of other 2-pass protocols of the PACS and the 1.5-move protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
JTC(Air)/94.12.15-119Rc, Personal Communication Services, PACS Air Interface Specification, PN3418
Zheng, Y.: An authentication and security protocol for mobile computing. In: proceedings of lFIP, pp. 249–257 (1996)
Bellocre: Generic Criteria for Version 0.1: Wireless Access Communications Systems (WACS), Technical Reference, TR - INS - 001313, Issue. 1 (October 1993)
Reserch & Development Center for Radio Systems, RCR STD-28, Personal Handy-phone System, Version 1 (December 1993)
Horn, G., Preneel, B.: Authentication and payment in future mobile systems. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 277–293. Springer, Heidelberg (1998)
Horn, G., Martin, K.M., Mitchell, C.J.: Authentication protocols for mobile network environment value-added services, draft, available at http://isg.rhbnc.ac.uk/cjm/Chris_Mitchell.htm
ANSI X9.63-199x, Elliptic curve key agreement and key transport protocols, Working draft (July 1998)
Manezes, A.J., van Oorshot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)
Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)
Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)
Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) < < cost (signature) + cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Zheng, Y., Imai, H.: Efficient signcryption schemes on elliptic curves. In: Proceedings of the IFIP 14th International Information Security Conference, IFIP/SEC 1998 (1998)
Petersen, H., Michels, M.: Cryptanalysis and improvement of signcryption schemes. In: IEE Proc. Comput. Digit. Tech., vol. 145(2) (1998)
Xu, S., Wang, X.: Cryptanalysis and two authentication and key distribution protocols in portable communications systems. In: IEEE International Symposium on Information Theory and its Applications (ISIST 1996), vol. 1, pp. 347–350 (1996)
Beller, M.J., Chang, L.F., Yacobi, Y.: Privacy and authentication on a portable communications system. In: IEEE GLOBECOM 1991, pp. 1922–1927 (1991)
Rabin, M.O.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization, MIT Lab. Comp. Sci., TR-212 (January 1979)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, KH., Moon, SJ., Jeong, WY., Kim, TG. (2000). A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. In: Song, J. (eds) Information Security and Cryptology - ICISC’99. ICISC 1999. Lecture Notes in Computer Science, vol 1787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719994_13
Download citation
DOI: https://doi.org/10.1007/10719994_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67380-4
Online ISBN: 978-3-540-45568-4
eBook Packages: Springer Book Archive