Title :
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
Author :
Sui, Ai-Fen ; Hui, Lucas C K ; Yiu, S.M. ; Chow, K.P. ; Tsang, W.W. ; Chong, C.F. ; Pun, K.H. ; Chan, H.W.
Author_Institution :
Dept. of Comput. Sci., Hong Kong Univ., China
Abstract :
To provide secure communication for mobile devices, an authenticated key agreement protocol is an important primitive for establishing session keys. However, most existing authenticated key agreement protocols are not designed for wireless mobile communication for which bandwidth and device storage capacity are limited. Also, as mobile devices are more vulnerable to attack, providing forward secrecy becomes an essential element in the protocol. Based on Seo and Sweeney´s simple authenticated key agreement algorithm (SAKA), we develop an improved authenticated key agreement protocol that eliminates the disadvantages of SAKA and provides identity authentication, key validation, and perfect forward secrecy. Also, our protocol can foil man-in-the-middle attacks. We also show how our proposed protocol can be included in the current 3GPP2 specifications for OTASP to improve A-key (authentication key) distribution, which is the master key in IS-95 and cdma2000 mobile networks. The proposed protocol requires significantly less bandwidth, and less computational and storage overhead, while having higher security compared to 3GPP2 specifications. The proposed protocol can also be applied to other wireless communication scenarios.
Keywords :
3G mobile communication; cryptography; message authentication; mobile radio; protocols; telecommunication security; 3GPP2 specifications; IS-95; authenticated key agreement protocol; cdma2000; device storage capacity; identity authentication; key validation; man-in-the-middle attacks; perfect forward secrecy; secure communication; simple authenticated key agreement algorithm; wireless mobile communication; Authentication; Bandwidth; Communication system security; Elliptic curve cryptography; Elliptic curves; Mobile communication; Mobile computing; Public key cryptography; Wireless application protocol; Wireless communication;
Conference_Titel :
Wireless Communications and Networking Conference, 2005 IEEE
Print_ISBN :
0-7803-8966-2
DOI :
10.1109/WCNC.2005.1424840