Weaknesses of North American wireless authentication protocol
暂无分享,去创建一个
Security for cellular and PCS systems in the United States will be based on secret key schemes for authentication and encryption. The effectiveness of security for wireless, as in other applications of cryptography, will depend on the ability of the basic cryptographic algorithms to withstand attacks and on sound protocol design. We show the IS-41 authentication protocol to be unsound by pointing to multiple flaws in the protocol which allow a network impersonator to gain service without "breaking the CAVE algorithm". These flaws effectively nullify authentication.
[1] J. H. Moore. Protocol failures in cryptosystems , 1988, Proc. IEEE.
[2] E. Brickell,et al. Cryptanalysis: a survey of recent results , 1988, Proc. IEEE.
[3] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.
[4] Dan Brown,et al. Techniques for privacy and authentication in personal communication systems , 1995, IEEE Wirel. Commun..