Key Distribution Protocol for Digital Mobile Communication Systems
A key distribution protocol is proposed for digital mobile communi- cation systems. The protocol can be used with a star-type network. User terminals have a constraint of being hardware-limited.
Security of the protocol is discussed. A countermeasure is proposed to cope with a possible active attack by a conspiracy of two opponents.
KeywordsNetwork Center Replay Attack Active Attack Mobile Communication System User Terminal
- [DEN83]D. E. Denning, “Cryptography and Data Security”, Addison-Wesley, 1983.Google Scholar
- [JC85]W. de Jonge and D. Chaum, “Attacks on Some RSA Signatures”, Advances in Cryptology: Proceedings of Crypto’85, Springer-Verlag, pp. 12–27, 1986.Google Scholar
- [MOO88]J. H. Moore, “Protocol Failures in Cryptosystems”, Proc. of IEEE, Vol. 76, No. 5, pp. 594–602.Google Scholar
- [RAB79]M. O. Rabin, “Digitalized Signatures and Public-Key Functions as Intractable as Factorization”, MIT/LCS/TR-212, MIT Lab for Computer Science, Cambridge, Massachusetts, January 1979.Google Scholar
- [SIM87]G. J. Simmons, “An Impersonation-proof Identity Verification Scheme”, Advances in Cryptology: Proceedings of Crypto’87, Springer-Verlag, pp. 211–215, 1988.Google Scholar
- [SIM89]G. J. Simmons, private letter, January 1989.Google Scholar