Skip to main content

Enhanced Authentication and Key Agreement Mechanism Using PKI

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2018)

Abstract

Entity Authentication and Key Agreement (AKA), is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. The paper proposes an efficient authenticated key agreement scheme and increases the speed of authentication process more securely. The signaling overhead is minimized by creating the validity token at home agent of mobile equipment, which indicates if the certificate of the foreign agent is valid or invalid. An efficient way for the implementation of an enhanced version of the protocol is proposed. NTRU algorithm is applied to encrypt and decrypt the messages. NTRU algorithm is one of the efficient asymmetric key lattice-based cryptographic algorithm. NTRU has been proved to be the fastest and secure encryption algorithm. AES is used for symmetric key encryption. The result demonstrates that the proposed method is efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Albasheer, M.O., Bashier, E.B.M.: Enhanced model for PKI certificate validation in the mobile banking. In: 2013 International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), pp. 470–476, August 2013

    Google Scholar 

  2. Bai, T., Davis, S., Li, J., Jiang, H.: Analysis and acceleration of NTRU lattice-based cryptographic system. In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1–6, June 2014

    Google Scholar 

  3. Bhandari, R., Choudhary, A.: 3GPP AKA protocol: simplified authentication process. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(12), 655–658 (2014)

    Google Scholar 

  4. Forouzan, B.A.: Cryptography and Network Security, 1st edn. McGraw-Hill Inc., New York (2008)

    Google Scholar 

  5. Gururaj, H.L., Sunitha, R., Ramesh, B.: Enhanced authentication technique for next generation 3GPP networks. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 1361–1365, November 2014

    Google Scholar 

  6. Hoffstein, J., Pipher, J., Schanck, J.M., Silverman, J.H., Whyte, W., Zhang, Z.: Choosing parameters for NTRUEncrypt. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 3–18. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52153-4_1

    Chapter  Google Scholar 

  7. Jiang, S., Zhu, X., Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)

    Article  Google Scholar 

  8. Khan, W., Ullah, H.: Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography. Int. J. Comput. Sci. Issues (IJCSI) 7(3), 10 (2010)

    Google Scholar 

  9. Micciancio, D., Regev, O.: Lattice-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 147–191. Springer, Berlin (2009). https://doi.org/10.1007/978-3-540-88702-7_5

    Chapter  MATH  Google Scholar 

  10. El Moustaine, E., Laurent, M.: A lattice based authentication for low-cost RFID. In: 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 68–73, November 2012

    Google Scholar 

  11. Munoz, J.L., Forne, J., Castro, J.C.: Evaluation of certificate revocation policies: OCSP vs. Overissued-CRL. In: Proceedings of the 13th International Workshop on Database and Expert Systems Applications, pp. 511–515, September 2002

    Google Scholar 

  12. Nguyen, H.B.: An overview of the NTRU cryptographic system. Ph.D. thesis, San Diego State University (2014)

    Google Scholar 

  13. Park, S.W., Lee, I.Y.: Anonymous authentication scheme based on NTRU for the protection of payment information in NFC mobile environment. J. Inf. Process. Syst. 9(3), 461–476 (2013)

    Article  Google Scholar 

  14. Shen, X., Du, Z., Chen, R.: Research on NTRU algorithm for mobile Java security. In: 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing, pp. 366–369, September 2009

    Google Scholar 

  15. Stallings, W.: Cryptography and Network Security: Principles and Practice, 6th edn. Prentice Hall Press, Upper Saddle River (2013)

    Google Scholar 

  16. Zemao, C., Junge, Z., Biyi, H.: Optimizing PKI for 3GPP authentication and key agreement. In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp. 79–82. IEEE (2012)

    Google Scholar 

  17. Zhao, X., Wenyan, Z., Shanshan, C.: New certificate status verification scheme based on OCSP for wireless environment. In: 2009 International Forum on Computer Science-Technology and Applications, vol. 2, pp. 195–198, December 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasundhara Acharya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prakasha, K., Gowda, P., Acharya, V., Muniyal, B., Khandelwal, M. (2018). Enhanced Authentication and Key Agreement Mechanism Using PKI. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2907-4_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2906-7

  • Online ISBN: 978-981-13-2907-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics