Weaknesses of North American wireless authentication protocol

Security for cellular and PCS systems in the United States will be based on secret key schemes for authentication and encryption. The effectiveness of security for wireless, as in other applications of cryptography, will depend on the ability of the basic cryptographic algorithms to withstand attacks and on sound protocol design. We show the IS-41 authentication protocol to be unsound by pointing to multiple flaws in the protocol which allow a network impersonator to gain service without "breaking the CAVE algorithm". These flaws effectively nullify authentication.

[1]  J. H. Moore Protocol failures in cryptosystems , 1988, Proc. IEEE.

[2]  E. Brickell,et al.  Cryptanalysis: a survey of recent results , 1988, Proc. IEEE.

[3]  Douglas L. Reilly,et al.  Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.

[4]  Dan Brown,et al.  Techniques for privacy and authentication in personal communication systems , 1995, IEEE Wirel. Commun..