期刊文献+

A Secure MAKAP for Wireless Communication 被引量:3

A Secure MAKAP for Wireless Communication
下载PDF
导出
摘要 A mutual authentication and key establishment protocol proposed by Aydos et al, for wireless communication based on elliptic curve cryptography can provide authentication between the user and server and they agreement a session key in the end of it. Unfortunately, Mangipudi pointed out Aydos' scheme was incurred the man-in-middle attack denial-of-service attack and impersonation based on man-in-middle attack. Then he proposed an improved scheme m overcome the above weakness. However, there is an attack which can forge the message required in the protocol and impersonation a valid user to the server. A mutual authentication and key establishment protocol proposed by Aydos et al, for wireless communication based on elliptic curve cryptography can provide authentication between the user and server and they agreement a session key in the end of it. Unfortunately, Mangipudi pointed out Aydos' scheme was incurred the man-in-middle attack denial-of-service attack and impersonation based on man-in-middle attack. Then he proposed an improved scheme m overcome the above weakness. However, there is an attack which can forge the message required in the protocol and impersonation a valid user to the server.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1749-1752,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the Natural Science Foundation ofShandong Province (Y2005G09)
关键词 mutual authentication and key agreement elliptic curve cryptography CRYPTANALYSIS mutual authentication and key agreement elliptic curve cryptography cryptanalysis
  • 相关文献

参考文献11

  • 1Whitfield Diffie,Paul C. Oorschot,Michael J. Wiener.Authentication and authenticated key exchanges[J].Designs Codes and Cryptography.1992(2)
  • 2Diffie W,Van Oorschot P C,Wiener M J.Authentication and authenticated key exchanges[].Designs Codes and Cryptography.1992
  • 3Koblitz N.Elliptic curve cryptosystems[].Mathematics of Computation.1987
  • 4V.S. Miller.use of elliptic curve in cryptography[].CRYPTO.1985
  • 5Sun H. M,Hsieh B. T,Tseng S. M.Cryptanalysis of Aydos etal.’s ecc-based wireless authentication protocol[].Proceedings of the IEEE International Conference on e-Technology e-Commerce and e-Service.2004
  • 6Aydos M,Sunar B.An Elliptic Curve Cryptography Based Authentication and Key Agreement Protocol for Wireless Communication [ EB/OL]. http:// www. crypto. wpi.edu/ Publications / Documents/ask-98-an.pdf . 2005
  • 7Aydos M,Savas E.Implementing Network Security Proto- cols Based on Elliptic Curve Cryptography. http:// www.christianroepke.de/ studium/asy- krypto/gf2-ecc-pdf . 2005
  • 8Mugino S.Elliptic Curve Cryptosystems. http:// www.cs.mcgill.ca/-crepeau/ PDF/ moi- remugino.pdf . 2005
  • 9Vanstone S A.Next Generation Security for Wireless :Elliptic Curve Cryptography. http:// www. compseconline.com/hottopics/hottopic20-8/ Next.pdf . 2005
  • 10Mangipudi K,Malneedi N,Katti R.Attack and Solutions on Aydos-Savas-Koc’’s Wireless Authentication Protocol[].Global Telecommunications Conference GLOBE- COM’’.2004

同被引文献19

  • 1Aydos M, Sunar B, Koe C K. An Elliptic Curve Cryptography Based Authentication and Key Agreement Protocol for Wireless Communication[C]. USA: In 2^nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. 1998.
  • 2Shim K. Cryptanalysis of Mutual Authentication and Key Exchange for Low Power Wireless Communications[J]. IEEE Communication Letter, 2003(05):248-250.
  • 3Syverson P F, Vanoorscho P C. On Unifiing Some Cryptographic Protocol Logics[C]//In: Proceedings of the 1994 IEEE Computer Society Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1994: 14-28.
  • 4Syverson P F, Vanoorscho P C. A Unified Cryptographic Protocol Logics[M], Naval Research lab, 1996.
  • 5KOBLITZ N.Elliptic curve cryptosystems[J].Math of Computation,1987,48(177):203-209.
  • 6MILLER V.Use of elliptic curve in cryptography[A].Advances in Cryptology-Crypto'85 proceedings[C].London:Springer Verlag,1986:417-426.
  • 7AYDOS M,SAVAS E,KOC C K.Implementing Network Security Protocols based on Elliptic curve Cryptography[J].http://www.christianroepke.de/studium/asy-krypto/gf2-ecc-.pdf.
  • 8KRISTIN L.The advantages of Elliptic Curve Cryptography for wireless security[J].IEEE Wireless Communication,2004,11(2):62-67.
  • 9WONG D S,CHAN A H.Mutually authentication and key exchange for low power wireless commutications[J].Proc IEEE MILCOM 2001 Conf,2001,12(1):39-43.
  • 10BLANK-WILSON,JOHNSON D,MENEZES A.Key agreement protocols and their security analysis[A].Proceedings of the sixth IMA International Conference on Cryptography and Coding,Lecture Notes in Computer Science 1355[C].New York:Springer-Verlag,1997:30-45.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部