scispace - formally typeset
Open AccessJournal ArticleDOI

An extended certificate-based authentication and security protocol for mobile networks

TLDR
An improved protocol is proposed to remedy attacks of Yi et al.'s scheme, and the protection against attacks can be assured and the security of the key distribution on the mobile network is enhanced.
Abstract
An optimized certificate-based protocol for mobile network with authentication and security has been proposed by Yi et al. This protocol allows efficient computation and less storage requirement in the mobile device. As a result, less power is consumed in the mobile device. However, in 1999, 2002, and 2003, Martin et al., Wong, and Laih et al. respectively showed that Yi et al.’s scheme is vulnerable to some attacks, but did not remedy these attacks. In this paper, we propose an improved protocol to remedy these attacks. Using the new protocol, the protection against attacks can be assured. The security of the key distribution on the mobile network is enhanced as well.

read more

Content maybe subject to copyright    Report

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

An Enhanced Authenticated Key Agreement for Session Initiation Protocol

TL;DR: This paper demonstrates that the Xie’s authentication scheme is vulnerable to impersonation attack, and proposes a more secure and efficient scheme, which does not only cover all the security flaws and weaknesses of related previous protocols, but also provides more functionalities.
Journal ArticleDOI

A New Public Key Encryption with Conjunctive Field Keyword Search Scheme

TL;DR: An efficient secure channel free public key encryption with conjunctive field keyword search scheme that can stand against the off-line keyword-guessing attacks, which is more suitable for the weak devices used by users.
Proceedings ArticleDOI

Insecure connection bootstrapping in cellular networks: the root of all evil

TL;DR: A Public-key infrastructure (PKI) based authentication mechanism which builds on top of the asymmetric cryptography used in 5G and adheres to the relevant deployment constraints and performs better than a symmetric key-based scheme in terms of security guarantee, overhead, and deployment constraints.
Journal ArticleDOI

Secure smart card based password authentication scheme with user anonymity

TL;DR: An enhanced version of Wang et al.'s scheme to remedy security flaws, which enable malicious attackers to counterfeit an application server to spoof the victim client and damage the security of session key and the property of user anonymity is proposed.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

A password authentication scheme over insecure networks

TL;DR: This paper proposes a new password authentication scheme that can support the Diffie-Hellman key agreement protocol over insecure networks and users and the system can use the agreed session key to encrypt/decrypt their communicated messages using the symmetric cryptosystem.
Journal ArticleDOI

Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments

TL;DR: The scheme proposed in this paper can enhance the security of Zhu and Ma's scheme and is also simple and efficient.
Related Papers (5)