Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications

With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ETRI journal Jg. 34; H. 3; S. 482 - 484
1. Verfasser: He, Debiao
Format: Journal Article
Sprache:Englisch
Veröffentlicht: 한국전자통신연구원 01.06.2012
Schlagworte:
ISSN:1225-6463, 2233-7326
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others’ protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure.
AbstractList With the rapid progress of wireless mobile communications,the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices,most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However,in this letter, we point out that Lo and others’ protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure. KCI Citation Count: 7
With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others’ protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure.
Author He, Debiao
Author_xml – sequence: 1
  givenname: Debiao
  surname: He
  fullname: He, Debiao
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001666984$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNqNkbFOwzAQhi0EEm3hBZg8sqTY5yROxioqUFEEqooYGCzHtYvbJK7sVChvT9oyMXX6pdN9d7rvhuiycY1G6I6ScQw0e9Ctt5sxhTEBSseExeQCDQAYiziD9BINKEASpXHKrtEwhA0hQOIkG6Cvwne7Vjay6oIN2BksGzzZt9-6aa2SrV7hF93hydprXfc1_O5d65SrsHEef1qvKx0CfnWlrTQuXF3vmwNnXRNu0JWRVdC3fzlCH4_TZfEczd-eZsVkHinIMogSxki6As1jxpLSsIRleclNznTOlZHGxKUCQxJCSS6lWvEyzeJScpCkTKmSbITuT3Mbb8RWWeGkPebaia0Xk8VyJnLKE877Vji1Ku9C8NqInbe19J2gRBxMiqNJQUEcTIqDyR7K_kHKtscTWy9tdRb60-vpzlgmpstF_5oM2C_cuY8K
CitedBy_id crossref_primary_10_1007_s11277_014_1968_8
crossref_primary_10_1002_dac_2405
crossref_primary_10_1007_s11277_013_1282_x
crossref_primary_10_1007_s11227_014_1198_6
crossref_primary_10_1002_dac_2708
Cites_doi 10.1109/WCNC.2005.1424840
10.1016/j.csi.2007.04.002
10.1109/IIH-MSP.2008.14
ContentType Journal Article
Copyright 2012 ETRI
Copyright_xml – notice: 2012 ETRI
DBID AAYXX
CITATION
ACYCR
DOI 10.4218/etrij.12.0211.0340
DatabaseName CrossRef
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2233-7326
EndPage 484
ExternalDocumentID oai_kci_go_kr_ARTI_917577
10_4218_etrij_12_0211_0340
ETR20482
Genre letter
GrantInformation_xml – fundername: Fundamental Research Funds for the Central Universities and the Specialized Research Fund for the Doctoral Program of Higher Education of China
  funderid: 20110141120003
GroupedDBID -~X
.4S
.DC
.UV
0R~
1OC
29G
2WC
5GY
5VS
9ZL
AAKPC
AAYBS
ACGFS
ACXQS
ACYCR
ADBBV
ADDVE
AENEX
ALMA_UNASSIGNED_HOLDINGS
ARCSS
AVUZU
BCNDV
DU5
E3Z
EBS
EDO
EJD
GROUPED_DOAJ
IPNFZ
ITG
ITH
JDI
KQ8
KVFHK
MK~
ML~
O9-
OK1
P5Y
RIG
RNS
TR2
TUS
WIN
XSB
AAMMB
AAYXX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
ALUQN
CITATION
OVT
ID FETCH-LOGICAL-c2882-53306d2e74335bf35389b7f93e97cfaff4bc2f050109aacd7b684ba72a0b61ca3
IEDL.DBID WIN
ISSN 1225-6463
IngestDate Sat Oct 25 08:02:08 EDT 2025
Tue Nov 18 20:15:36 EST 2025
Sat Nov 29 03:21:23 EST 2025
Wed Jan 22 17:05:48 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2882-53306d2e74335bf35389b7f93e97cfaff4bc2f050109aacd7b684ba72a0b61ca3
Notes G704-001110.2012.34.3.007
OpenAccessLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001666984
PageCount 3
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_917577
crossref_primary_10_4218_etrij_12_0211_0340
crossref_citationtrail_10_4218_etrij_12_0211_0340
wiley_primary_10_4218_etrij_12_0211_0340_ETR20482
PublicationCentury 2000
PublicationDate June 2012
2012-06-01
2012-06
PublicationDateYYYYMMDD 2012-06-01
PublicationDate_xml – month: 06
  year: 2012
  text: June 2012
PublicationDecade 2010
PublicationTitle ETRI journal
PublicationYear 2012
Publisher 한국전자통신연구원
Publisher_xml – name: 한국전자통신연구원
References 2005; 4
2007; 29
2008
2010; 6
Key-10.4218/etrij.12.0211.0340-3
Key-10.4218/etrij.12.0211.0340-2
Key-10.4218/etrij.12.0211.0340-1
References_xml – volume: 6
  start-page: 5249
  issue: 11
  year: 2010
  end-page: 5258
  article-title: A Secure and Efficient ECC‐based AKA Protocol for Wireless Mobile Communications
  publication-title: Int. J. Innovative Comput., Info. Control
– volume: 4
  start-page: 2088
  year: 2005
  end-page: 2093
  article-title: An Improved Authenticated Key Agreement Protocol with Perfect Forward Secrecy for Wireless Mobile Communication
  publication-title: IEEE Wireless Commun. Netw. Conf.
– start-page: 1375
  year: 2008
  end-page: 1378
  article-title: An Improved Authentication Key Agreement Protocol Based on Elliptic Curve For Wireless Mobile Networks
– volume: 29
  start-page: 647
  year: 2007
  end-page: 652
  article-title: An Enhanced Authenticated Key Agreement Protocol for Wireless Mobile Communication
  publication-title: Comput. Stds. Interfaces
– ident: Key-10.4218/etrij.12.0211.0340-1
  doi: 10.1109/WCNC.2005.1424840
– ident: Key-10.4218/etrij.12.0211.0340-2
  doi: 10.1016/j.csi.2007.04.002
– ident: Key-10.4218/etrij.12.0211.0340-3
  doi: 10.1109/IIH-MSP.2008.14
SSID ssj0020458
Score 1.9641651
Snippet With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention....
With the rapid progress of wireless mobile communications,the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention....
SourceID nrf
crossref
wiley
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 482
SubjectTerms 3GPP2
Authenticated key agreement
offline password guessing attack
wireless mobile communication
전자/정보통신공학
Title Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
URI https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.12.0211.0340
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001666984
Volume 34
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX ETRI Journal, 2012, 34(3), , pp.482-484
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: WIN
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEA4qHvTgW3wTwZssdnezyeZYfKCopYhiwUNI0kRqZVfWKvjvncm2xSKIiKe9bIYwmUzmm0y-IeTAMJ05x3UkYtuImIStmGspImyJI7xzqbOBMv9KtFp5pyPbU-Rk9Bam5ocYJ9xwZwR_jRtcm9CFhMGphIs4qHpPIZWXIA1nyhC4xyzGNgb3F60x6sKbQERdYLgRZzytX86gkKPvIiZOp-mi8pMxazh0zhb_Z7pLZGEYdNJmbSXLZMoVK2T-CxXhKnk4rj5eIFCsKUpo6akuKObPsJoIq6a69NJ90CbA85BQpO2qHJRgRRSiXoo1tM_gM-l1aWB2dOLZyesauTs7vT0-j4aNFyKbYMSNFae8mziILtLM-BScojTCy9RJYb32nhmb-EaG12pa264wPGdGi0Q3DI-tTtfJTFEWboPQLpfGxOAWLPOsYXye5hbEu8xzzqSVmyQeKVzZISs5Nsd4VoBOUHUqKE7FiULFKVTcJjkcj3mpOTl-_Hsf1lH1bU8hlTZ-H0vVrxQAhgsFaDUTAmYR1u4X4tTp7Q2SHSdbfxizTeYg4ErqUrMdMjOo3twumbXvg95rtRfs9hPYtO-f
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwEA86BfXBb_HbCL5JcW3TpHkUmTicQ2Si4ENIskTmpJVuCv733rVzOAQR8akvzREuucvvLpffEXJkmE6c4zoQoa0HTIIpplqKAFviCO9c7GxJmd8S7XZ6fy-vp0jj8y1MxQ8xTrihZZT-Gg0cE9Jo5QyOJVzFYdF7KnN5EfJwxgwi9xkGiAM7ONw12-O4C-8CMe6CrRtwxuPq7QxKOfkuY-J8ms4KP4lay2PnfOmfJrxMFke4k55WG2WFTLlslSx8YSNcIw9nxfsLYMWKpYTmnuqMYgoNC4qwcKpLL907PYUIvcwp0usiH-awkSgAX4pltM_gNulVbmB6dOLlyWCd3J43OmcXwaj3QmAjBN1YdMq7kQOAESfGx-AXpRFexk4K67X3zNjI1xO8WdPadoXhKTNaRLpueGh1vEFqWZ65TUK7XBoTgmewzLO68WmcWhDvEs85k1ZukfBT48qOiMmxP8azggAFVadKxakwUqg4hYrbIsfjMS8VLcePfx_CQqq-7Slk08bvY676hYKYoakgYE2EgFmUi_cLcarRuUG-42j7D2MOyNxF56qlWs325Q6ZB_wVVZVnu6Q2LF7dHpm1b8PeoNgvN_EH3rjzvQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA6-ED34Ft9G8CbFbZsmzVF0Fxd1WURB8BCSNJFVaZe6Cv57Z9p1cRFExFMvzRAmM5P5JpMvhBwaphPnuA5EaBsBk-CKqZYiwCdxhHcudraizL8UnU56dye7E6T5eRem5ocYFdzQM6p4jQ7u-plHL2ewLeEqDsreY1XLi5CHM2aA3KcZB2COF0vanRHuwrNAxF1gugFnPK7vzqCU4-8yxvanybz041lrte20Fv9pwktkYZh30pPaUJbJhMtXyPwXNsJVcn9avvchV6xZSmjhqc4pltCwoQgbpzJ64d7pCSD0qqZIu2UxKMCQKCS-FNtonyFs0qvCwPTo2M2TlzVy22renJ4Hw7cXAhth0o1NpzyLHCQYcWJ8DHFRGuFl7KSwXnvPjI18I8GTNa1tJgxPmdEi0g3DQ6vjdTKVF7nbIDTj0pgQIoNlnjWMT-PUgniXeM6ZtHKThJ8aV3ZITI7vYzwrACioOlUpToWRQsUpVNwmORqN6de0HD_-fQALqZ5sTyGbNn4fCvVUKsAMbQWANRECZlEt3i_EqebNNfIdR1t_GLNPZrtnLXXZ7lxskzlIv6K68WyHTA3KV7dLZuzboPdS7lU2_AGUPfNB
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+an+Authenticated+Key+Agreement+Protocol+for+Wireless+Mobile+Communications&rft.jtitle=ETRI+journal&rft.au=He%2C+Debiao&rft.date=2012-06-01&rft.issn=1225-6463&rft.volume=34&rft.issue=3&rft.spage=482&rft.epage=484&rft_id=info:doi/10.4218%2Fetrij.12.0211.0340&rft.externalDBID=n%2Fa&rft.externalDocID=10_4218_etrij_12_0211_0340
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon