Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications

With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:ETRI journal Ročník 34; číslo 3; s. 482 - 484
Hlavný autor: He, Debiao
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: 한국전자통신연구원 01.06.2012
Predmet:
ISSN:1225-6463, 2233-7326
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others’ protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure.
Bibliografia:G704-001110.2012.34.3.007
ISSN:1225-6463
2233-7326
DOI:10.4218/etrij.12.0211.0340