A Study of User Authentication Protocols in Mobile Communication System
碩士 === 國立中興大學 === 資訊科學研究所 === 89 === Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology....
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2001
|
Online Access: | http://ndltd.ncl.edu.tw/handle/81235844231006228108 |
id |
ndltd-TW-089NCHU0394009 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-089NCHU03940092016-07-06T04:11:04Z http://ndltd.ncl.edu.tw/handle/81235844231006228108 A Study of User Authentication Protocols in Mobile Communication System 行動通訊上使用者認證協定之探討 Shih-Pin Chen 陳世斌 碩士 國立中興大學 資訊科學研究所 89 Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology. As we enjoy this convenience, we should notice that the transmission media is radio channel. And the radio channel is vulnerable to eavesdropping by unauthorized users. How to prevent illegal users from passive eavesdropping and active tampering is an emergent topic. There are many authentication protocols based on public key cryptography. Some use heavy computations and some are not secure enough. In this thesis, we introduce several protocols based on public key cryptography. We found there is a secure flaw in Park’s protocol, which will allow an attacker to masquerade the base station. An revised protocol is proposed. To enhance Park’s protocol, we use two different ways to authentication the two parties. One is Challenge─Response with server aided, and the other is similar to Schnorr’s Identification Scheme. They have the same properties as the original protocol yet they are more secure. Our new protocol provides mutual authentication and session key exchange. It also has offline authentication mechanism on the dynamic certificate and a secure end-to-end communication between two mobile users. Gwo-Boa Horng 洪國寶 2001 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中興大學 === 資訊科學研究所 === 89 === Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology. As we enjoy this convenience, we should notice that the transmission media is radio channel. And the radio channel is vulnerable to eavesdropping by unauthorized users. How to prevent illegal users from passive eavesdropping and active tampering is an emergent topic.
There are many authentication protocols based on public key cryptography. Some use heavy computations and some are not secure enough. In this thesis, we introduce several protocols based on public key cryptography. We found there is a secure flaw in Park’s protocol, which will allow an attacker to masquerade the base station. An revised protocol is proposed. To enhance Park’s protocol, we use two different ways to authentication the two parties. One is Challenge─Response with server aided, and the other is similar to Schnorr’s Identification Scheme. They have the same properties as the original protocol yet they are more secure. Our new protocol provides mutual authentication and session key exchange. It also has offline authentication mechanism on the dynamic certificate and a secure end-to-end communication between two mobile users.
|
author2 |
Gwo-Boa Horng |
author_facet |
Gwo-Boa Horng Shih-Pin Chen 陳世斌 |
author |
Shih-Pin Chen 陳世斌 |
spellingShingle |
Shih-Pin Chen 陳世斌 A Study of User Authentication Protocols in Mobile Communication System |
author_sort |
Shih-Pin Chen |
title |
A Study of User Authentication Protocols in Mobile Communication System |
title_short |
A Study of User Authentication Protocols in Mobile Communication System |
title_full |
A Study of User Authentication Protocols in Mobile Communication System |
title_fullStr |
A Study of User Authentication Protocols in Mobile Communication System |
title_full_unstemmed |
A Study of User Authentication Protocols in Mobile Communication System |
title_sort |
study of user authentication protocols in mobile communication system |
publishDate |
2001 |
url |
http://ndltd.ncl.edu.tw/handle/81235844231006228108 |
work_keys_str_mv |
AT shihpinchen astudyofuserauthenticationprotocolsinmobilecommunicationsystem AT chénshìbīn astudyofuserauthenticationprotocolsinmobilecommunicationsystem AT shihpinchen xíngdòngtōngxùnshàngshǐyòngzhěrènzhèngxiédìngzhītàntǎo AT chénshìbīn xíngdòngtōngxùnshàngshǐyòngzhěrènzhèngxiédìngzhītàntǎo AT shihpinchen studyofuserauthenticationprotocolsinmobilecommunicationsystem AT chénshìbīn studyofuserauthenticationprotocolsinmobilecommunicationsystem |
_version_ |
1718338933057650688 |