Skip to main content
Log in

A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications

  • Computer & Information Science
  • Published:
Journal of Zhejiang University-SCIENCE A Aims and scope Submit manuscript

Abstract

In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M. Aydos protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Aydos, M., Sunar, B., Koç, Ç.K., 1998. An Elliptic Curve Cryptography Based Authentication and Key Agreement Protocol for Wireless Communication. 2nd Int. Workshop Discrete Algorithms and Methods for Mobility (DIALM’98), Dallas, TX.

  • Beller, M.J., Yacobi, Y., 1993. Fully-fledged two-way public key authentication and key agreement for low-cost terminal.IEEE Electronics Letters,29(11):999–1001.

    Article  Google Scholar 

  • Hoffstein, J., Silverman, J.H., 2001. NSS: The NTRU signature scheme.Proc. of Eurocrypt ’01,2045:211–228.

    MathSciNet  MATH  Google Scholar 

  • Hoffstein, J., Silverman, J.H., 2002. Optimizations for NTRU. Public-Key Cryptography and Computational Number Theory. DeGruyter. http://www.ntru.com.

  • Hoffstein, J., Pipher, J., Silverman, J.H., 1998. NTRU: A new high speed public key cryptosystem.Algorithmic Number Theory (ANTS III),1423:267–288.

    Article  MATH  Google Scholar 

  • Park, C.S., 1995. Session key distribution protocol based on linear algebra for mobile communication network.IEE Electronics Letters,31(23):1980–1981.

    Article  Google Scholar 

  • 3GPP TS 21.133 V3.1.0, 3rd Generation Partnership Project, 1999. 3G Security: Security Threats and Requirements.

Download references

Author information

Authors and Affiliations

Authors

Additional information

Project (No. 60372076) supported by the National Natural Science Foundation of China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jun, J., Chen, H. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications. J. Zheijang Univ.-Sci. A 6, 399–404 (2005). https://doi.org/10.1631/jzus.2005.A0399

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/jzus.2005.A0399

Key words

Document code

CLC number

Navigation