Skip to main content

A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications

  • Conference paper
Information Security and Cryptology - ICISC’99 (ICISC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1787))

Included in the following conference series:

  • 308 Accesses

Abstract

We present a new 2-pass authentication and key agreement protocol for mobile communications. The protocol solves the weaknesses of the PACS and Zheng’s 1.5-move protocol for air-interface of mobile systems. The paper outlines the new protocol, examines its various aspects, and compares them to those of other 2-pass protocols of the PACS and the 1.5-move protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. JTC(Air)/94.12.15-119Rc, Personal Communication Services, PACS Air Interface Specification, PN3418

    Google Scholar 

  2. Zheng, Y.: An authentication and security protocol for mobile computing. In: proceedings of lFIP, pp. 249–257 (1996)

    Google Scholar 

  3. Bellocre: Generic Criteria for Version 0.1: Wireless Access Communications Systems (WACS), Technical Reference, TR - INS - 001313, Issue. 1 (October 1993)

    Google Scholar 

  4. Reserch & Development Center for Radio Systems, RCR STD-28, Personal Handy-phone System, Version 1 (December 1993)

    Google Scholar 

  5. Horn, G., Preneel, B.: Authentication and payment in future mobile systems. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 277–293. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  6. Horn, G., Martin, K.M., Mitchell, C.J.: Authentication protocols for mobile network environment value-added services, draft, available at http://isg.rhbnc.ac.uk/cjm/Chris_Mitchell.htm

  7. ANSI X9.63-199x, Elliptic curve key agreement and key transport protocols, Working draft (July 1998)

    Google Scholar 

  8. Manezes, A.J., van Oorshot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  9. Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  10. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  11. Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)

    MATH  Google Scholar 

  12. Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) < < cost (signature) + cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Google Scholar 

  13. Zheng, Y., Imai, H.: Efficient signcryption schemes on elliptic curves. In: Proceedings of the IFIP 14th International Information Security Conference, IFIP/SEC 1998 (1998)

    Google Scholar 

  14. Petersen, H., Michels, M.: Cryptanalysis and improvement of signcryption schemes. In: IEE Proc. Comput. Digit. Tech., vol. 145(2) (1998)

    Google Scholar 

  15. Xu, S., Wang, X.: Cryptanalysis and two authentication and key distribution protocols in portable communications systems. In: IEEE International Symposium on Information Theory and its Applications (ISIST 1996), vol. 1, pp. 347–350 (1996)

    Google Scholar 

  16. Beller, M.J., Chang, L.F., Yacobi, Y.: Privacy and authentication on a portable communications system. In: IEEE GLOBECOM 1991, pp. 1922–1927 (1991)

    Google Scholar 

  17. Rabin, M.O.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization, MIT Lab. Comp. Sci., TR-212 (January 1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, KH., Moon, SJ., Jeong, WY., Kim, TG. (2000). A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. In: Song, J. (eds) Information Security and Cryptology - ICISC’99. ICISC 1999. Lecture Notes in Computer Science, vol 1787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719994_13

Download citation

  • DOI: https://doi.org/10.1007/10719994_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67380-4

  • Online ISBN: 978-3-540-45568-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics