Mutual Authentication and Key Agreement based on Elliptic Curve Cryptography for GSM

In this paper we propose an improvement to the GSM authentication protocol, based on Elliptic Curve Cryptography. The proposed protocol offers enhanced security since it does not use A5/0, A5/1 and A5/2 algorithms which have been already broken. The proposed protocol provides mutual authentication, requires less storage, avoids replay attack and consumes smaller network bandwidth.

[1]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[2]  Liu Zhi-meng An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication , 2008 .

[3]  Chin-Chen Chang,et al.  Efficient authentication protocols of GSM , 2005, Comput. Commun..

[4]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.

[5]  Cheng-Chi Lee,et al.  Extension of authentication protocol for GSM , 2003 .

[6]  Ali Aydin Selçuk,et al.  A strong user authentication protocol for GSM , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).

[7]  Min-Shiang Hwang,et al.  An efficient authentication protocol for GSM networks , 2000, IEEE/AFCEA EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security (Cat. No.00EX405).

[8]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[9]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[10]  Ashutosh Saxena,et al.  Mutual Authentication and Key Agreement for GSM , 2006, 2006 International Conference on Mobile Business.

[11]  Robert Cole,et al.  Computer Communications , 1982, Springer New York.

[12]  N. Koblitz Elliptic curve cryptosystems , 1987 .