A Study of User Authentication Protocols in Mobile Communication System

碩士 === 國立中興大學 === 資訊科學研究所 === 89 === Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology....

Full description

Bibliographic Details
Main Authors: Shih-Pin Chen, 陳世斌
Other Authors: Gwo-Boa Horng
Format: Others
Language:zh-TW
Published: 2001
Online Access:http://ndltd.ncl.edu.tw/handle/81235844231006228108
id ndltd-TW-089NCHU0394009
record_format oai_dc
spelling ndltd-TW-089NCHU03940092016-07-06T04:11:04Z http://ndltd.ncl.edu.tw/handle/81235844231006228108 A Study of User Authentication Protocols in Mobile Communication System 行動通訊上使用者認證協定之探討 Shih-Pin Chen 陳世斌 碩士 國立中興大學 資訊科學研究所 89 Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology. As we enjoy this convenience, we should notice that the transmission media is radio channel. And the radio channel is vulnerable to eavesdropping by unauthorized users. How to prevent illegal users from passive eavesdropping and active tampering is an emergent topic. There are many authentication protocols based on public key cryptography. Some use heavy computations and some are not secure enough. In this thesis, we introduce several protocols based on public key cryptography. We found there is a secure flaw in Park’s protocol, which will allow an attacker to masquerade the base station. An revised protocol is proposed. To enhance Park’s protocol, we use two different ways to authentication the two parties. One is Challenge─Response with server aided, and the other is similar to Schnorr’s Identification Scheme. They have the same properties as the original protocol yet they are more secure. Our new protocol provides mutual authentication and session key exchange. It also has offline authentication mechanism on the dynamic certificate and a secure end-to-end communication between two mobile users. Gwo-Boa Horng 洪國寶 2001 學位論文 ; thesis 58 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中興大學 === 資訊科學研究所 === 89 === Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology. As we enjoy this convenience, we should notice that the transmission media is radio channel. And the radio channel is vulnerable to eavesdropping by unauthorized users. How to prevent illegal users from passive eavesdropping and active tampering is an emergent topic. There are many authentication protocols based on public key cryptography. Some use heavy computations and some are not secure enough. In this thesis, we introduce several protocols based on public key cryptography. We found there is a secure flaw in Park’s protocol, which will allow an attacker to masquerade the base station. An revised protocol is proposed. To enhance Park’s protocol, we use two different ways to authentication the two parties. One is Challenge─Response with server aided, and the other is similar to Schnorr’s Identification Scheme. They have the same properties as the original protocol yet they are more secure. Our new protocol provides mutual authentication and session key exchange. It also has offline authentication mechanism on the dynamic certificate and a secure end-to-end communication between two mobile users.
author2 Gwo-Boa Horng
author_facet Gwo-Boa Horng
Shih-Pin Chen
陳世斌
author Shih-Pin Chen
陳世斌
spellingShingle Shih-Pin Chen
陳世斌
A Study of User Authentication Protocols in Mobile Communication System
author_sort Shih-Pin Chen
title A Study of User Authentication Protocols in Mobile Communication System
title_short A Study of User Authentication Protocols in Mobile Communication System
title_full A Study of User Authentication Protocols in Mobile Communication System
title_fullStr A Study of User Authentication Protocols in Mobile Communication System
title_full_unstemmed A Study of User Authentication Protocols in Mobile Communication System
title_sort study of user authentication protocols in mobile communication system
publishDate 2001
url http://ndltd.ncl.edu.tw/handle/81235844231006228108
work_keys_str_mv AT shihpinchen astudyofuserauthenticationprotocolsinmobilecommunicationsystem
AT chénshìbīn astudyofuserauthenticationprotocolsinmobilecommunicationsystem
AT shihpinchen xíngdòngtōngxùnshàngshǐyòngzhěrènzhèngxiédìngzhītàntǎo
AT chénshìbīn xíngdòngtōngxùnshàngshǐyòngzhěrènzhèngxiédìngzhītàntǎo
AT shihpinchen studyofuserauthenticationprotocolsinmobilecommunicationsystem
AT chénshìbīn studyofuserauthenticationprotocolsinmobilecommunicationsystem
_version_ 1718338933057650688