Mutual Authentication and Key Agreement based on Elliptic Curve Cryptography for GSM

Author(s):  
Kavitha Ammayappan ◽  
Ashutosh Saxena ◽  
Atul Negi
2015 ◽  
Vol 6 (1) ◽  
pp. 39-52
Author(s):  
Prabhdeep Kaur ◽  
Sheetal Kalra

Secure and efficient mutual authentication and key agreement schemes form the basis for any robust network communication system. Elliptic Curve Cryptography (ECC) has emerged as one of the most successful Public Key Cryptosystem that efficiently meets all the security challenges. Comparison of ECC with other Public Key Cryptosystems (RSA, Rabin, ElGamal) shows that it provides equal level of security for a far smaller bit size, thereby substantially reducing the processing overhead. This makes it suitable for constrained environments like wireless networks and mobile devices as well as for security sensitive applications like electronic banking, financial transactions and smart grids. With the successful implementation of ECC in security applications (e-passports, e-IDs, embedded systems), it is getting widely commercialized. ECC is simple and faster and is therefore emerging as an attractive alternative for providing security in lightweight device, which contributes to its popularity in the present scenario. In this paper, we have analyzed some of the recent password based authentication and key agreement schemes using ECC for various environments. Furthermore, we have carried out security, functionality and performance comparisons of these schemes and found that they are unable to satisfy their claimed security goals.


2010 ◽  
Vol 108-111 ◽  
pp. 1503-1508
Author(s):  
Li Hua Zhang ◽  
Li Ping Zhang ◽  
Er Fei Bai

Recently, several one time password authentication schemes have been proposed. However, most one-time password authentication schemes have security flaws. In this paper, a novel one-time password authentication and key agreement scheme (EAKAS) based on elliptic curve digital signature chain is developed. The proposed scheme has the following merits password or verification table is not required in the server; users can choose or change password; it can resist off-line dictionary attacks and achieves mutual authentication; it has no system clock synchronization and no constraint of transmission delay; it can resist replay attacks, man-in-the-middle attack and insider attack; it is sensitive to password error and strong in security restoration; the session keys in proposed scheme have the feature of freshness, confidentiality, known key security and forward security. Compared with the related schemes, our proposed scheme has better security and well suited to scenarios requiring a high level security.


2013 ◽  
Vol 380-384 ◽  
pp. 2407-2410
Author(s):  
Xin Xu ◽  
Ping Zhu ◽  
Zheng Ping Jin ◽  
Hua Zhang

Recently, several protocols came into being successively to meet the requirement of efficient operations in low-power roaming environment with the fast advance of communication technologies. Unfortunately, these protocols are not a suitable candidate for special requirements in automobile roaming system such as low consumption, high performance and convenience since these protocols pay more attention to a common network environment. In this paper, we address the problem of mutual authentication and key agreement with user anonymity for an automobile roaming system. More specifically, we propose the protocol employs elliptic curve cryptography system to enhance operational efficiency and take into account common attacks and give corresponding resist measures to ensure security. The analysis shows our scheme is user friendly and secure.


Sign in / Sign up

Export Citation Format

Share Document