Abstract
In 1998, Yi et al. proposed an authenticated key transport protocol for providing secure communications between the base station and the mobile user based on DSA signature scheme. Unfortunately, Laih and Chiou soon showed that Yi et al.’s scheme suffered from the forgery attack which an intruder can forge a valid certificate of a legal user. In this article, we present a simpler attack on Yi et al.’s scheme than that of Laih and Chiou. Furthermore, we also propose an improvement to repair Yi et al.’s scheme. The security of our proposed improvement is also based on DSA signature scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yi, X., Okamoto, E., Lam, K.Y.: An optimized protocol for mobile network authentication and security. ACM Mobile Computing and Communications Review 2(3), 37–39 (1998)
Martin, K., Mitchell, C.L.: Comments on an optimized protocol for mobile authentication and security. ACM Mobile Computing and Communications Review 3(2), 37 (1999)
Yi, X.: Author’s reply to Comments on an optimized protocol for mobile authentication and security. ACM Mobile Computing and Communications Review 3(2), 38 (1999)
Boyd, C., Mathuria, A.: Key establishment protocols for secure mobile communications: A critical survey. Computer Communications 23, 575–587 (2000)
Wang, D.S.: On the design and analysis of authenticated key exchange schemes for low power wireless computing platforms. Ph.D. Thesis (July 2002)
Wang, D.S.: An optimized authentication protocol for mobile network reconsidered. ACM Mobile Computing and Communications Review 6(4), 74–76 (2002)
Laih, C.S., Chiou, S.Y.: Cryptanalysis of an optimized protocol for mobile network authentication and security. Information Processing Letters 85, 339–341 (2003)
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 33(2), 469–472 (1985)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
National Institute of Standards and Technology, Digital Signature Standard (DSS): Fed-eral Information Processing Standards Publication. FIPS PUB 186-2, Reaffirmed (January 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, C., Lee, J. (2005). Improvement on an Optimized Protocol for Mobile Network Authentication and Security. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_79
Download citation
DOI: https://doi.org/10.1007/11596981_79
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)