1994
DOI: 10.1145/182110.182112
|View full text |Cite
|
Sign up to set email alerts
|

Optimal privacy and authentication on a portable communications system

Abstract: Beller, Chang and Yacobi [2] have recently proposed a set of secret key and public key protocols to meet authentication and privacy requirements for conversation set-up protocols for the initiating party of portable communication systems. This paper improves upon the protocols to obtain a higher assurance of authentication and key distribution. Conversation set-up protocols for the responding party are discussed, a public key protocol providing end-to-end authentication and privacy is described, and relative a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
23
0

Year Published

1999
1999
2012
2012

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(23 citation statements)
references
References 11 publications
0
23
0
Order By: Relevance
“…As pointed out by Carlsen [23] this is not achieved by the protocol because the attacker may masquerade as a base station. This attack turns up as the pairs (A i , • ) and ( • , B j ) in ψ in Table 11.…”
Section: Extensions To the Control Flow Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…As pointed out by Carlsen [23] this is not achieved by the protocol because the attacker may masquerade as a base station. This attack turns up as the pairs (A i , • ) and ( • , B j ) in ψ in Table 11.…”
Section: Extensions To the Control Flow Analysismentioning
confidence: 99%
“…The Improved MSR (IMSR) protocol [8], on the other hand, is meant to provide mutual authentication by including an extra certificate for the base station B in the first message ({|B|} K − U ). Once the certificate has been sent in clear it may, however, be replayed as reported by Carlsen [23]. As a consequence all the attacks on MSR still work on the IMSR and this includes our new parallel session attack where unintended use of the new certificate shows up as pairs (B j , A i ) in ψ.…”
Section: Extensions To the Control Flow Analysismentioning
confidence: 99%
“…BeHer et al, [2,3], proposed several authentication protocols based on Modular Square Root (MSR) and/or EIGamal signature scheme. Carlsen, [6], proposed some enhancements to the protocols in [2]. Xu and Wang , [19], improved the protocol in [3].…”
Section: Introductionmentioning
confidence: 99%
“…The Carlsen also describes a five message protocol, the Secret Key Initiator Protocol [9], as follows:…”
mentioning
confidence: 99%