On Key Distribution and Authentication in Mobile Radio Networks

Mobile communication networks need public key cryptosystems that offer both low computation cost and user authentication. Tatebayashi et al. showed such a key distribution protocol for such networks at CRYPTO'89 based on low exponent RSA. This paper shows that their protocol is not secure. We also present a new secure and efficient key distribution protocol.

[1]  Gustavus J. Simmons,et al.  A "Weak" Privacy Protocol using the RSA Crypto Algorithm , 1983, Cryptologia.

[2]  Li-Fung Chang,et al.  Privacy and authentication on a portable communications system , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.

[3]  David Chaum,et al.  Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .

[4]  J. H. Moore Protocol failures in cryptosystems , 1988, Proc. IEEE.

[5]  Johan Håstad,et al.  On Using RSA with Low Exponent in a Public Key Network , 1985, CRYPTO.

[6]  Natsume Matsuzaki,et al.  Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.