Key Establishment Protocols for Secure Mobile Communications: A Selective Survey

We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases refinements are suggested, either to improve the efficiency or to allow simplified security analysis.

[1]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[4]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[5]  Natsume Matsuzaki,et al.  Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.

[6]  Klaus Vedder Security Aspects of Mobile Communications , 1991, Computer Security and Industrial Cryptography.

[7]  Yacov Yacobi,et al.  Security for personal communications services: public-key vs. private key approaches , 1992, [1992 Proceedings] The Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[8]  Kaoru Kurosawa,et al.  On Key Distribution and Authentication in Mobile Radio Networks , 1994, EUROCRYPT.

[9]  M. Beller,et al.  Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .

[10]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[11]  Ashar Aziz,et al.  Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.

[12]  Catherine A. Meadows,et al.  Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.

[13]  Ulf Carlsen Optimal privacy and authentication on a portable communications system , 1994, OPSR.

[14]  Yi Mu,et al.  Design of Secure End-toEnd Protocols for Mobile Systems , 1996, IFIP World Conference on Mobile Communications.

[15]  Yi Mu,et al.  On the design of security protocols for mobile communications , 1996, ACISP.

[16]  Roger M. Needham The changing environment for security protocols , 1997 .