Title :
Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices
Author :
Chang, Chin-Chen ; Lin, Shih-Yi ; Yang, Jen-Ho
Author_Institution :
Dept. of Inf. Eng. & Comput. Sci., Feng Chia Univ., Taichung, Taiwan
Abstract :
Kerberos is a well-known network authentication mechanism. Based upon Kerberos´ model, Sun and Yeh proposed three user authentication and key establishment (UAKE) protocols with perfect forward secrecy (PFS). However, due to the use of public-key cryptosystem to implement UAKE, their protocols are not suitable for mobile devices, which have computational, power and storage constraints. Therefore, in this paper, we propose three UAKE protocols with PFS that are efficient and practical for mobile devices. And because our protocols are based on one-way hash functions and exclusive-or (XOR) operations, the computation loads and the power requirements are less than those in Sun and Yeh´s protocols.
Keywords :
cryptographic protocols; mobile handsets; exclusive-or operations; key establishment protocols; mobile devices; network authentication mechanism; one-way hash functions; perfect forward secrecy; public-key cryptosystem; user authentication; Access protocols; Authentication; Computer networks; Computer science; Electronic mail; Mobile communication; Mobile computing; Network servers; Public key cryptography; Sun; Key establishment; perfect forward secrecy; user authentication;
Conference_Titel :
Computer and Information Technology, 2009. CIT '09. Ninth IEEE International Conference on
Conference_Location :
Xiamen
Print_ISBN :
978-0-7695-3836-5
DOI :
10.1109/CIT.2009.45