메뉴 건너뛰기




Volumn 22, Issue 3, 2011, Pages 99-112

On the security of an enhanced UMTS authentication and key agreement protocol

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION AND KEY AGREEMENTS; AUTHENTICATION SCHEME; COMPUTATIONAL ANALYSIS; ENHANCED UMTS; HOME NETWORKS; MESSAGES TRANSMISSION; NON-REPUDIATION SERVICES; PUBLIC KEY CRYPTOSYSTEMS; UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEMS;

EID: 79953899288     PISSN: 1124318X     EISSN: 15418251     Source Type: Journal    
DOI: 10.1002/ett.1460     Document Type: Article
Times cited : (15)

References (47)
  • 3
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the global system of mobile communications
    • Lee C-H, Hwang M-S, Yang W-P,. Enhanced privacy and authentication for the global system of mobile communications. Wireless Networks 1999; 5: 231-243.
    • (1999) Wireless Networks , vol.5 , pp. 231-243
    • Lee, C.-H.1    Hwang, M.-S.2    Yang, W.-P.3
  • 4
    • 0031257939 scopus 로고    scopus 로고
    • An authentication technique based on distributed security management for the global mobility network
    • PII S0733871697060836
    • Suzuki S, Nakada K,. Authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications 1997; 15: 1608-1617. (Pubitemid 127583971)
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.8 , pp. 1608-1617
    • Suzuki, S.1    Nakada, K.2
  • 5
    • 63149108602 scopus 로고    scopus 로고
    • Security measures and weaknesses of the GPRS security architecture
    • Xenakis C,. Security measures and weaknesses of the GPRS security architecture. International Journal of Network Security 2008; 6 (2): 158-169.
    • (2008) International Journal of Network Security , vol.6 , Issue.2 , pp. 158-169
    • Xenakis, C.1
  • 6
    • 0029359261 scopus 로고
    • Techniques for privacy and authentication in personal communication systems
    • Brown D,. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications 1995; 2: 6-10.
    • (1995) IEEE Personal Communications , vol.2 , pp. 6-10
    • Brown, D.1
  • 8
    • 0031144513 scopus 로고    scopus 로고
    • Authenticated Key-Exchange in a Mobile Radio Network
    • Hwang M-S, Lee C-H,. Authenticated key-exchange in a mobile radio network. European Transactions on Telecommunications 1997; 8 (3): 265-269. (Pubitemid 127441413)
    • (1997) European Transactions on Telecommunications , vol.8 , Issue.3 , pp. 265-269
    • Hwang, M.-S.1    Lee, C.-H.2
  • 9
    • 0032690458 scopus 로고    scopus 로고
    • A novel application of the phone card and its authentication in mobile communications
    • Lee C-H, Hwang M-S, Yang W-P,. A novel application of the phone card and its authentication in mobile communications. Journal of Information Science and Engineering 1999; 15 (4): 471-484.
    • (1999) Journal of Information Science and Engineering , vol.15 , Issue.4 , pp. 471-484
    • Lee, C.-H.1    Hwang, M.-S.2    Yang, W.-P.3
  • 10
    • 0029358520 scopus 로고
    • Privacy and authentication needs of PCS
    • Wilkes JE,. Privacy and authentication needs of PCS. IEEE Personal Communications 1995; 2: 11-15.
    • (1995) IEEE Personal Communications , vol.2 , pp. 11-15
    • Wilkes, J.E.1
  • 13
    • 73149093942 scopus 로고    scopus 로고
    • Efficient user authentication and key agreement with user privacy protection
    • Juang W-S, Wu J-L,. Efficient user authentication and key agreement with user privacy protection. International Journal of Network Security 2008; 7 (1): 120-129.
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 120-129
    • Juang, W.-S.1    Wu, J.-L.2
  • 16
    • 0033365053 scopus 로고    scopus 로고
    • Anonymous channel and authentication in wireless communications
    • DOI 10.1016/S0140-3664(99)00108-5
    • Juang W-S, Lei C-L, Chang C-Y,. Anonymous channel and authentication in wireless communications. Computer Communications 1999; 22: 1502-1511. (Pubitemid 30501389)
    • (1999) Computer Communications , vol.22 , Issue.15 , pp. 1502-1511
    • Juang, W.-S.1    Lei, C.-L.2    Chang, C.-Y.3
  • 18
    • 4544286919 scopus 로고    scopus 로고
    • Privacy and authentication protocol providing anonymous channels in GSM
    • Peinado A,. Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications 2004; 27: 1709-1715.
    • (2004) Computer Communications , vol.27 , pp. 1709-1715
    • Peinado, A.1
  • 19
    • 70350453453 scopus 로고    scopus 로고
    • Efficient certificateless authentication and key agreement (CL-AK) for grid computing
    • Wang S, Cao Z, Bao H,. Efficient certificateless authentication and key agreement (CL-AK) for grid computing. International Journal of Network Security 2008; 7 (3): 342-347.
    • (2008) International Journal of Network Security , vol.7 , Issue.3 , pp. 342-347
    • Wang, S.1    Cao, Z.2    Bao, H.3
  • 20
    • 1542287661 scopus 로고    scopus 로고
    • On the security of wireless network access with enhancements
    • (San Diego, CA, USA), September
    • Harn L, Hsin W-J,. On the security of wireless network access with enhancements. Proceedings of the 2003 ACM workshop on Wireless security, (San Diego, CA, USA), September 2003; 88-95.
    • (2003) Proceedings of the 2003 ACM Workshop on Wireless Security , pp. 88-95
    • Harn, L.1    Hsin, W.-J.2
  • 21
    • 0033364756 scopus 로고    scopus 로고
    • Authentication protocols with nonrepudiation services in personal communication systems
    • DOI 10.1109/4234.781006
    • Lin H-Y, Harn L,. Authentication protocols with nonrepudiation services in personal communication systems. IEEE Communications Letters 1999; 3: 236-238. (Pubitemid 30527370)
    • (1999) IEEE Communications Letters , vol.3 , Issue.8 , pp. 236-238
    • Lin, H.-Y.1    Harn, L.2
  • 22
    • 0032685793 scopus 로고    scopus 로고
    • Performance of an enhanced GSM protocol supporting non-repudiation of service
    • Stach JF, Park EK, Makki K,. Performance of an enhanced GSM protocol supporting non-repudiation of service. Computer Communications 1999; 22: 675-680.
    • (1999) Computer Communications , vol.22 , pp. 675-680
    • Stach, J.F.1    Park, E.K.2    Makki, K.3
  • 23
    • 79953893543 scopus 로고    scopus 로고
    • TETRA, the industry standard from ETSI
    • (Intercontinental Hotel Dubai), May
    • Friis J,. TETRA, the industry standard from ETSI. 2nd TETRA Middle East Conference, (Intercontinental Hotel Dubai), May 2004.
    • (2004) 2nd TETRA Middle East Conference
    • Friis, J.1
  • 24
    • 0033907037 scopus 로고    scopus 로고
    • Extensions to an authentication technique proposed for the global mobility network
    • DOI 10.1109/26.837039
    • Buttyan L, Gbaguidi C, Staamann S, Wilhelm U,. Extensions to an authentication technique proposed for the global mobility network. IEEE Transactions on Communications 2000; 48: 373-376. (Pubitemid 30589215)
    • (2000) IEEE Transactions on Communications , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Staamann, S.3    Wilhelm, U.4
  • 26
    • 33745701569 scopus 로고    scopus 로고
    • 3GPP TS 33.200 3G security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security, Technical Report Release 6, 3GPP, December 2004
    • 3GPP TS 33.200, 3GPP: Techinical specification group services and system aspects; 3G security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security, Technical Report Release 6, 3GPP, December 2004.
    • 3GPP: Techinical Specification Group Services and System Aspects
  • 27
    • 33745701569 scopus 로고    scopus 로고
    • 3GPP TS 33.200 3G security; Network Domain Security (NDS); IP network layer security, Technical Report Release 6, 3GPP, June 2004
    • 3GPP TS 33.200, 3GPP: Techinical specification group services and system aspects; 3G security; Network Domain Security (NDS); IP network layer security, Technical Report Release 6, 3GPP, June 2004.
    • 3GPP: Techinical Specification Group Services and System Aspects
  • 28
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public key cryptosystems
    • DOI 10.1145/359340.359342
    • Rivest RL, Shamir A, Adleman L,. A method for obtaining digital signatures and public key cryptosystems. Communications ACM 1978; 21: 120-126. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30
    • 33847249399 scopus 로고    scopus 로고
    • Technical Report, RSA Laboratories, May 2003
    • Kaliski B,. TWIRL and RSA key size, Technical Report, RSA Laboratories, May 2003.
    • TWIRL and RSA Key Size
    • Kaliski, B.1
  • 31
    • 79953886477 scopus 로고    scopus 로고
    • National Institute of Satndards and Technology (NIST), Sepecial publication 800-857: recommendation for key management. part 1: General guideline, Technical Report, January 2003
    • National Institute of Satndards and Technology (NIST), Sepecial publication 800-857: recommendation for key management. part 1: General guideline, Technical Report, January 2003.
  • 32
    • 79953865481 scopus 로고    scopus 로고
    • National Institute of Satndards and Technology (NIST), Advanced encryption standard, Technical Report, FIPS 197, NIST, US Department Commerce, November 2001
    • National Institute of Satndards and Technology (NIST), Advanced encryption standard, Technical Report, FIPS 197, NIST, US Department Commerce, November 2001.
  • 36
    • 3042783229 scopus 로고    scopus 로고
    • A self-encryption mechanism for authentication of roaming and teleconference services
    • Hwang K-F, Chang C-C,. A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications 2003; 2: 400-407.
    • (2003) IEEE Transactions on Wireless Communications , vol.2 , pp. 400-407
    • Hwang, K.-F.1    Chang, C.-C.2
  • 37
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • Springer-Verlag 497-506 Lecture Notes in Computer Science
    • Matsumoto T, Kato K, Imai H,. Speeding up secret computations with insecure auxiliary devices. Advances in Cryptology-Proceeding of Crypto'88, Springer-Verlag, 1988; 497-506 Lecture Notes in Computer Science, Vol. 403.
    • (1988) Advances in Cryptology-Proceeding of Crypto'88 , vol.403
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 38
    • 0026897713 scopus 로고
    • Attack on server assisted authentication protocols
    • Anderson RJ,. Attack on server assisted authentication protocols. Electronics Letters 1992; 28 (15): 1473. (Pubitemid 23566792)
    • (1992) Electronics Letters , vol.28 , Issue.15 , pp. 1473
    • Anderson, R.J.1
  • 42
    • 0027617773 scopus 로고
    • Fast server-aided secret computation protocols for modular exponentiation
    • Kawamura S, Shimbo A,. Fast server-aided secret computation protocols for modular exponentiation. IEEE Journal on Selected Areas in Communications 1993; 11 (5): 778-784.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.1    Shimbo, A.2
  • 44
  • 45
    • 0029632472 scopus 로고
    • Cryptanalysis of secure addition chain for SASC applications
    • Yen S-M,. Cryptanalysis of secure addition chain for SASC applications. IEE Electronics Letters 1995; 31 (3): 175-176.
    • (1995) IEE Electronics Letters , vol.31 , Issue.3 , pp. 175-176
    • Yen, S.-M.1
  • 47
    • 70350679039 scopus 로고    scopus 로고
    • An extended authentication and key agreement protocol of UMTS
    • 5451/2009
    • Farhat F, Salimi S, Salahi A,. An extended authentication and key agreement protocol of UMTS. Lecture Notes in Computer Science 2009; 5451/2009: 230-244.
    • (2009) Lecture Notes in Computer Science , pp. 230-244
    • Farhat, F.1    Salimi, S.2    Salahi, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.