Extensions to an authentication technique proposed for the global mobility network

被引:38
作者
Buttyán, L [1 ]
Gbaguidi, C
Staamann, S
Wilhelm, W
机构
[1] Swiss Fed Inst Technol, Inst Comp Commun & Applicat, CH-1015 Lausanne, Switzerland
[2] XTRADYNE Technol AG, D-10119 Berlin, Germany
[3] Swiss Fed Inst Technol, Operating Syst Lab, CH-1015 Lausanne, Switzerland
关键词
entity authentication; global mobility network;
D O I
10.1109/26.837039
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present three attacks on the authentication protocol that has been proposed for the so-called global mobility network in the October 1997 issue of the IEEE Journal on Selected Areas in Communications. We show that the attacks are feasible and propose corrections that make the protocol more robust and resistant against two of the presented attacks. Our aim is to highlight some basic design principles for cryptographic protocols, the adherence to which would have prevented these attacks.
引用
收藏
页码:373 / 376
页数:4
相关论文
共 6 条
[1]  
Abadi Martin, 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P122, DOI 10.1109/RISP.1994.296587
[2]   Mobility and security management in the GSM system and some proposed future improvements [J].
Mehrotra, A ;
Golding, LS .
PROCEEDINGS OF THE IEEE, 1998, 86 (07) :1480-1497
[3]  
*NBS, 1977, FED INF PROC STAND, V46
[4]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[5]  
RIVEST R, INTERNET REQUEST COM
[6]   An authentication technique based on distributed security management for the global mobility network [J].
Suzuki, S ;
Nakada, K .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1997, 15 (08) :1608-1617