Skip to main content

A Forward-Secrecy WTLS Handshake Protocol Based on XTR

  • Conference paper
Advances in Information Security and Assurance (ISA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5576))

Included in the following conference series:

  • 1808 Accesses

Abstract

Because of the lack of the forward secrecy and the indefensibility from intermediator attacks and DOS attacks in WTLS, the security of current WTLS handshake protocol is far from satisfactory. In this paper we propose a new WTLS handshake protocol to solve these problems. Forward secrecy attribute has been added in the scheme, and a practicable WTLS handshake protocol has been designed on XTR system. Experiments have been taken on MSM6280 platform and the result turns out that the above security problems were efficiently solved and achieve a good performance on popular embedded platform. The conclusion can be drawn that the security and practicability of WTLS protocol has been greatly improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. WAP Forum. Wireless Application Protocol Wireless Transport Layer Security Specification Version 06 [EB /OL][2006-02-02 ], http://www.wapforum.org

  2. TSL. The TLS Protocol version 1.0 [EB/OL][2006-02-02], http://www.ietf.org

  3. Park, D., Boyd, C., Moon, S.: Forward secrecy and its application to future mobile communications security. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 433–445. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Lee, K., Moon, S.: AKA Protocols for Mobile Communications. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 400–411. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Karkd, J., Ha, J.C., Lee, H.J.: A WTLS Handshake Protocol with User Anonymous and Forward Secrecy. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)

    Google Scholar 

  6. Cui, Y.Y., Zhou, Y.B., Ding, J.K.: Secrecy Analysis and Improvement of a Kind of WTLS Handshake Protocol with User Anonymity and Forward Secrecy. High Technology Letters 15(4), 6–10 (2005)

    Google Scholar 

  7. Lenstra, A.K., Verheul, E.R.: The XTR public key system. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, p. 1. Springer, Heidelberg (2000)

    Google Scholar 

  8. Lenstra, K., Verheul, R.: Key improvements to XTR. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, p. 220. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  9. Qualcomm. Ltd co. mobile Station Modern 6280 specification [EB\OL][2006-02-02], http://www.cdmatech.com/solutions/pdf/msm6280.chipset.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, B. (2009). A Forward-Secrecy WTLS Handshake Protocol Based on XTR. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02617-1_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02616-4

  • Online ISBN: 978-3-642-02617-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics