Wang Quan-lai, Han Ji-hong, Wang Ya-di . Design and Analysis of an Authentication Protocol for Digital Mobile Communication System[J]. Journal of Electronics & Information Technology, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346
Citation:
Wang Quan-lai, Han Ji-hong, Wang Ya-di . Design and Analysis of an Authentication Protocol for Digital Mobile Communication System[J]. Journal of Electronics & Information Technology, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346
Wang Quan-lai, Han Ji-hong, Wang Ya-di . Design and Analysis of an Authentication Protocol for Digital Mobile Communication System[J]. Journal of Electronics & Information Technology, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346
Citation:
Wang Quan-lai, Han Ji-hong, Wang Ya-di . Design and Analysis of an Authentication Protocol for Digital Mobile Communication System[J]. Journal of Electronics & Information Technology, 2007, 29(1): 189-192. doi: 10.3724/SP.J.1146.2005.00346
This paper designs a communion key distribution protocol based on asymmetric cipher system, and an authentication protocol based on symmetric cipher system for the requirement of digital mobile communication system. Then this protocol is analyzed by using the Spi calculus and its security is proved.
[1] Boyd C and Mathuria A. Protocols for Authentication and Key Establishment. Springer, 2003: 33-72. [2] Basyouni A. Analysis of wireless cryptographic protocols. [Master thesis].[J].Kingson, Ontario, Queens University, Canada.1997,:- [3] Mu Y and Varadharajan V. On the design of security for mobile communications. ACISP96, Australia, 1996: 134-145. [4] Brown D. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications, 1995, 2(4): 6-10. [5] Mao WenBo. Modern Cryptography: Theory and Practice(英文版). 北京: 电子工业出版社. Beijing: Publishing House of Electronics Industry, 2004: 367-382. [6] Burrows M, Abadi M, and Needham R. A logic of authentication[J].Proceedings of the Royal Society of London A.1989, 426(1871):233-271 [7] Abadi M and Gordon A. A calculus for cryptographic protocols: The Spi calculus[J].Journal of Information and Computation.1999, 148(1):1-70 [8] Milner R, Parrow J, and Walker D. A calculus for mobile processes, part I/II[J].Journal of Information and Communication.1992, 100(1):1-77 [9] Blanchet B. From secrecy to authenticity in security protocols[J].Proceedings of SAS0.2002, LNCS 2477:342-359