Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless...
Gespeichert in:
| Veröffentlicht in: | ETRI journal Jg. 34; H. 3; S. 482 - 484 |
|---|---|
| 1. Verfasser: | |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
한국전자통신연구원
01.06.2012
|
| Schlagworte: | |
| ISSN: | 1225-6463, 2233-7326 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others’ protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure. |
|---|---|
| AbstractList | With the rapid progress of wireless mobile communications,the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices,most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However,in this letter, we point out that Lo and others’ protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure. KCI Citation Count: 7 With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others’ protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure. |
| Author | He, Debiao |
| Author_xml | – sequence: 1 givenname: Debiao surname: He fullname: He, Debiao |
| BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001666984$$DAccess content in National Research Foundation of Korea (NRF) |
| BookMark | eNqNkbFOwzAQhi0EEm3hBZg8sqTY5yROxioqUFEEqooYGCzHtYvbJK7sVChvT9oyMXX6pdN9d7rvhuiycY1G6I6ScQw0e9Ctt5sxhTEBSseExeQCDQAYiziD9BINKEASpXHKrtEwhA0hQOIkG6Cvwne7Vjay6oIN2BksGzzZt9-6aa2SrV7hF93hydprXfc1_O5d65SrsHEef1qvKx0CfnWlrTQuXF3vmwNnXRNu0JWRVdC3fzlCH4_TZfEczd-eZsVkHinIMogSxki6As1jxpLSsIRleclNznTOlZHGxKUCQxJCSS6lWvEyzeJScpCkTKmSbITuT3Mbb8RWWeGkPebaia0Xk8VyJnLKE877Vji1Ku9C8NqInbe19J2gRBxMiqNJQUEcTIqDyR7K_kHKtscTWy9tdRb60-vpzlgmpstF_5oM2C_cuY8K |
| CitedBy_id | crossref_primary_10_1007_s11277_014_1968_8 crossref_primary_10_1002_dac_2405 crossref_primary_10_1007_s11277_013_1282_x crossref_primary_10_1007_s11227_014_1198_6 crossref_primary_10_1002_dac_2708 |
| Cites_doi | 10.1109/WCNC.2005.1424840 10.1016/j.csi.2007.04.002 10.1109/IIH-MSP.2008.14 |
| ContentType | Journal Article |
| Copyright | 2012 ETRI |
| Copyright_xml | – notice: 2012 ETRI |
| DBID | AAYXX CITATION ACYCR |
| DOI | 10.4218/etrij.12.0211.0340 |
| DatabaseName | CrossRef Korean Citation Index |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2233-7326 |
| EndPage | 484 |
| ExternalDocumentID | oai_kci_go_kr_ARTI_917577 10_4218_etrij_12_0211_0340 ETR20482 |
| Genre | letter |
| GrantInformation_xml | – fundername: Fundamental Research Funds for the Central Universities and the Specialized Research Fund for the Doctoral Program of Higher Education of China funderid: 20110141120003 |
| GroupedDBID | -~X .4S .DC .UV 0R~ 1OC 29G 2WC 5GY 5VS 9ZL AAKPC AAYBS ACGFS ACXQS ACYCR ADBBV ADDVE AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS AVUZU BCNDV DU5 E3Z EBS EDO EJD GROUPED_DOAJ IPNFZ ITG ITH JDI KQ8 KVFHK MK~ ML~ O9- OK1 P5Y RIG RNS TR2 TUS WIN XSB AAMMB AAYXX ADMLS AEFGJ AGXDD AIDQK AIDYY ALUQN CITATION OVT |
| ID | FETCH-LOGICAL-c2882-53306d2e74335bf35389b7f93e97cfaff4bc2f050109aacd7b684ba72a0b61ca3 |
| IEDL.DBID | WIN |
| ISSN | 1225-6463 |
| IngestDate | Sat Oct 25 08:02:08 EDT 2025 Tue Nov 18 20:15:36 EST 2025 Sat Nov 29 03:21:23 EST 2025 Wed Jan 22 17:05:48 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2882-53306d2e74335bf35389b7f93e97cfaff4bc2f050109aacd7b684ba72a0b61ca3 |
| Notes | G704-001110.2012.34.3.007 |
| OpenAccessLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001666984 |
| PageCount | 3 |
| ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_917577 crossref_primary_10_4218_etrij_12_0211_0340 crossref_citationtrail_10_4218_etrij_12_0211_0340 wiley_primary_10_4218_etrij_12_0211_0340_ETR20482 |
| PublicationCentury | 2000 |
| PublicationDate | June 2012 2012-06-01 2012-06 |
| PublicationDateYYYYMMDD | 2012-06-01 |
| PublicationDate_xml | – month: 06 year: 2012 text: June 2012 |
| PublicationDecade | 2010 |
| PublicationTitle | ETRI journal |
| PublicationYear | 2012 |
| Publisher | 한국전자통신연구원 |
| Publisher_xml | – name: 한국전자통신연구원 |
| References | 2005; 4 2007; 29 2008 2010; 6 Key-10.4218/etrij.12.0211.0340-3 Key-10.4218/etrij.12.0211.0340-2 Key-10.4218/etrij.12.0211.0340-1 |
| References_xml | – volume: 6 start-page: 5249 issue: 11 year: 2010 end-page: 5258 article-title: A Secure and Efficient ECC‐based AKA Protocol for Wireless Mobile Communications publication-title: Int. J. Innovative Comput., Info. Control – volume: 4 start-page: 2088 year: 2005 end-page: 2093 article-title: An Improved Authenticated Key Agreement Protocol with Perfect Forward Secrecy for Wireless Mobile Communication publication-title: IEEE Wireless Commun. Netw. Conf. – start-page: 1375 year: 2008 end-page: 1378 article-title: An Improved Authentication Key Agreement Protocol Based on Elliptic Curve For Wireless Mobile Networks – volume: 29 start-page: 647 year: 2007 end-page: 652 article-title: An Enhanced Authenticated Key Agreement Protocol for Wireless Mobile Communication publication-title: Comput. Stds. Interfaces – ident: Key-10.4218/etrij.12.0211.0340-1 doi: 10.1109/WCNC.2005.1424840 – ident: Key-10.4218/etrij.12.0211.0340-2 doi: 10.1016/j.csi.2007.04.002 – ident: Key-10.4218/etrij.12.0211.0340-3 doi: 10.1109/IIH-MSP.2008.14 |
| SSID | ssj0020458 |
| Score | 1.9641651 |
| Snippet | With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention.... With the rapid progress of wireless mobile communications,the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention.... |
| SourceID | nrf crossref wiley |
| SourceType | Open Website Enrichment Source Index Database Publisher |
| StartPage | 482 |
| SubjectTerms | 3GPP2 Authenticated key agreement offline password guessing attack wireless mobile communication 전자/정보통신공학 |
| Title | Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.12.0211.0340 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001666984 |
| Volume | 34 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | ETRI Journal, 2012, 34(3), , pp.482-484 |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: WIN dateStart: 19970101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEA4qHvTgW3wTwZssdnezyeZYfKCopYhiwUNI0kRqZVfWKvjvncm2xSKIiKe9bIYwmUzmm0y-IeTAMJ05x3UkYtuImIStmGspImyJI7xzqbOBMv9KtFp5pyPbU-Rk9Bam5ocYJ9xwZwR_jRtcm9CFhMGphIs4qHpPIZWXIA1nyhC4xyzGNgb3F60x6sKbQERdYLgRZzytX86gkKPvIiZOp-mi8pMxazh0zhb_Z7pLZGEYdNJmbSXLZMoVK2T-CxXhKnk4rj5eIFCsKUpo6akuKObPsJoIq6a69NJ90CbA85BQpO2qHJRgRRSiXoo1tM_gM-l1aWB2dOLZyesauTs7vT0-j4aNFyKbYMSNFae8mziILtLM-BScojTCy9RJYb32nhmb-EaG12pa264wPGdGi0Q3DI-tTtfJTFEWboPQLpfGxOAWLPOsYXye5hbEu8xzzqSVmyQeKVzZISs5Nsd4VoBOUHUqKE7FiULFKVTcJjkcj3mpOTl-_Hsf1lH1bU8hlTZ-H0vVrxQAhgsFaDUTAmYR1u4X4tTp7Q2SHSdbfxizTeYg4ErqUrMdMjOo3twumbXvg95rtRfs9hPYtO-f |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwEA86BfXBb_HbCL5JcW3TpHkUmTicQ2Si4ENIskTmpJVuCv733rVzOAQR8akvzREuucvvLpffEXJkmE6c4zoQoa0HTIIpplqKAFviCO9c7GxJmd8S7XZ6fy-vp0jj8y1MxQ8xTrihZZT-Gg0cE9Jo5QyOJVzFYdF7KnN5EfJwxgwi9xkGiAM7ONw12-O4C-8CMe6CrRtwxuPq7QxKOfkuY-J8ms4KP4lay2PnfOmfJrxMFke4k55WG2WFTLlslSx8YSNcIw9nxfsLYMWKpYTmnuqMYgoNC4qwcKpLL907PYUIvcwp0usiH-awkSgAX4pltM_gNulVbmB6dOLlyWCd3J43OmcXwaj3QmAjBN1YdMq7kQOAESfGx-AXpRFexk4K67X3zNjI1xO8WdPadoXhKTNaRLpueGh1vEFqWZ65TUK7XBoTgmewzLO68WmcWhDvEs85k1ZukfBT48qOiMmxP8azggAFVadKxakwUqg4hYrbIsfjMS8VLcePfx_CQqq-7Slk08bvY676hYKYoakgYE2EgFmUi_cLcarRuUG-42j7D2MOyNxF56qlWs325Q6ZB_wVVZVnu6Q2LF7dHpm1b8PeoNgvN_EH3rjzvQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA6-ED34Ft9G8CbFbZsmzVF0Fxd1WURB8BCSNJFVaZe6Cv57Z9p1cRFExFMvzRAmM5P5JpMvhBwaphPnuA5EaBsBk-CKqZYiwCdxhHcudraizL8UnU56dye7E6T5eRem5ocYFdzQM6p4jQ7u-plHL2ewLeEqDsreY1XLi5CHM2aA3KcZB2COF0vanRHuwrNAxF1gugFnPK7vzqCU4-8yxvanybz041lrte20Fv9pwktkYZh30pPaUJbJhMtXyPwXNsJVcn9avvchV6xZSmjhqc4pltCwoQgbpzJ64d7pCSD0qqZIu2UxKMCQKCS-FNtonyFs0qvCwPTo2M2TlzVy22renJ4Hw7cXAhth0o1NpzyLHCQYcWJ8DHFRGuFl7KSwXnvPjI18I8GTNa1tJgxPmdEi0g3DQ6vjdTKVF7nbIDTj0pgQIoNlnjWMT-PUgniXeM6ZtHKThJ8aV3ZITI7vYzwrACioOlUpToWRQsUpVNwmORqN6de0HD_-fQALqZ5sTyGbNn4fCvVUKsAMbQWANRECZlEt3i_EqebNNfIdR1t_GLNPZrtnLXXZ7lxskzlIv6K68WyHTA3KV7dLZuzboPdS7lU2_AGUPfNB |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+an+Authenticated+Key+Agreement+Protocol+for+Wireless+Mobile+Communications&rft.jtitle=ETRI+journal&rft.au=He%2C+Debiao&rft.date=2012-06-01&rft.issn=1225-6463&rft.volume=34&rft.issue=3&rft.spage=482&rft.epage=484&rft_id=info:doi/10.4218%2Fetrij.12.0211.0340&rft.externalDBID=n%2Fa&rft.externalDocID=10_4218_etrij_12_0211_0340 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon |