scispace - formally typeset
Search or ask a question

Showing papers by "Chris J. Mitchell published in 1999"


Journal ArticleDOI
TL;DR: Two new attacks are given on a cipher block chaining-message authentication code algorithm which is in the final stages of being standardised as MAC algorithm 4 in ISO/IEC FDIS 9797-1.
Abstract: Two new attacks are given on a cipher block chaining-message authentication code algorithm which is in the final stages of being standardised as MAC algorithm 4 in ISO/IEC FDIS 9797-1. The attacks are significantly more efficient than previously known attacks, which means that the inclusion of this scheme in the standard will need to be reconsidered.

13 citations


Journal ArticleDOI

8 citations


Journal ArticleDOI
TL;DR: The level of network authentication and security offered by a protocol proposed in [3] is considered and is considered to be higher than that offered in [2].
Abstract: The level of network authentication and security offered by a protocol proposed in [3] is considered

8 citations


Book ChapterDOI
01 Dec 1999
TL;DR: The chapter concludes that both protocols rely on the shared-key KUS remaining secret long term; other slightly more complex versions of the mechanisms can be devised, which do not have this requirement.
Abstract: Publisher Summary This chapter examines some of the security provisions in the emerging ETSI Universal Mobile Telecommunications System (UMTS) and ITU Future Public Land Mobile Telecommunications System (FPLMTS) standards for future mobile telecommunications networks. After a brief review of some of the most significant areas for the provision of security services, it focuses on the simultaneous provision of identity and location privacy for the mobile user and mutual authentication between mobile user and base station. Much of the work presented in this chapter has emerged from the DTI/EPSRC-funded LINK project, "Third Generation System Security Studies" (3GS3). The chapter concludes that both protocols rely on the shared-key KUS remaining secret long term; other slightly more complex versions of the mechanisms can be devised, which do not have this requirement. Also, variants of the second protocol can be devised to deal with various location-update requirements, including a three-message scheme corresponding to the current registration case of section.

3 citations


Journal ArticleDOI
TL;DR: The authors identify some cases in which the mechanism fails to achieve its objectives and proposes a common key recovery block (KRB) format.
Abstract: The introduction of a plethora of key recovery (KR) schemes and the lack of a standard has led to interoperability problems between dissimilar mechanisms. To overcome these problems the key recovery alliance (KRA) has proposed a common key recovery block (KRB) format. The authors identify some cases in which the mechanism fails to achieve its objectives.

3 citations


Journal ArticleDOI
01 Jul 1999
TL;DR: A 'fair' key generation and certification protocol for Diffie-Hellman keys is proposed, intended for use in cases where neither User nor CA are trusted to choose the User's key on their own.
Abstract: In this paper a 'fair' key generation and certification protocol for Diffie-Hellman keys is proposed, which is intended for use in cases where neither User nor CA are trusted to choose the User's key on their own. This protocol also ensures that key agreement mechanism 1 in ISO/IEC 11770-3 [2] provides 'fair key agreement' [4].

1 citations