Security flaws in authentication and key establishment protocols for mobile communications

被引:3
|
作者
Shim, K [1 ]
Lee, YR [1 ]
机构
[1] Ewha Womans Univ, Dept Math, Seoul 120750, South Korea
关键词
key establishment protocol; mutual authentication; known key-share attack; unknown key-share attack; denial-of-service attack;
D O I
10.1016/j.amc.2004.10.044
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Mobile electronic commerce has started recently to appear in the scene by exploiting the advantages of mobile computing and telecommunications in order to provide a large number of advanced services to mobile users. A variety of protocols suitable for applications in upcoming third-generation mobile systems such as UMTS have been proposed. In this paper, we identify security flaws with several authentication and key establishment protocols for mobile communications introducing a new kind of attack: known key-share attack. Our results show that the protocols do not provide authentication as intended. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:62 / 74
页数:13
相关论文
共 50 条
  • [1] Key establishment protocols for secure mobile communications: a critical survey
    Boyd, C
    Mathuria, A
    [J]. COMPUTER COMMUNICATIONS, 2000, 23 (5-6) : 575 - 587
  • [2] Security Flaws in Authentication Protocols with Anonymity for Wireless Environments
    Xu, Jing
    Feng, Dengguo
    [J]. ETRI JOURNAL, 2009, 31 (04) : 460 - 462
  • [3] Parsing ambiguities in authentication and key establishment protocols
    Chen, Liqun
    Mitchell, Chris J.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (01) : 82 - 94
  • [4] Analyzing the security flaws of internet key exchange protocols
    Zhang, Yong
    Feng, Dong-Lei
    Chen, Han-Sheng
    Bai, Ying-Cai
    [J]. Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
  • [5] On the design of security protocols for mobile communications
    Mu, Y
    Varadharajan, V
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 134 - 145
  • [6] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [7] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [8] Accelerating key establishment protocols for mobile communication
    Lee, S
    Hong, SM
    Yoon, H
    Cho, Y
    [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 51 - 63
  • [9] Security of public key certificate based authentication protocols
    Wen, W
    Saito, T
    Mizoguchi, F
    [J]. PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 196 - 209
  • [10] Addressing Flaws in RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    Ma, Di
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 216 - +