Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications

The authentication and anonymous channel protocol for large-scale area in wireless communications proposed in [Proc. Sixth IEEE Symposium on Computers and Communications (ISCC'01), 3-5 (2001) 36] by Lin-Jan is analyzed, proving that it is not secure. More precisely, fake anonymous channel tickets can be easily generated allowing nonauthorized users to be validated by the Visiting Network. Unlike it was claimed in [Proc. Sixth IEEE Symposium on Computers and Communications (ISCC'01), 3-5 (2001) 36], the security of this protocol does not rely on the difficulty of computing discrete logarithms over the finite field GF(p), p being a prime.

[1]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[2]  Jinn-ke Jan,et al.  A wireless-based authentication and anonymous channels for large scale area , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.

[3]  Kaoru Kurosawa,et al.  Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.

[4]  Srikanth Pullela Security Issues in Mobile Computing , 2002 .

[5]  Birgit Pfitzmann,et al.  Breaking Efficient Anonymous Channel , 1994, EUROCRYPT.