A Study of Authentication Protocol for Mobile Networks

博士 === 淡江大學 === 資訊工程學系博士班 === 94 === In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Yet, mainstream mobi...

Full description

Bibliographic Details
Main Authors: Feng-Fu Su, 蘇豐富
Other Authors: 黃仁俊
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/14397586654544342220
id ndltd-TW-094TKU05392001
record_format oai_dc
spelling ndltd-TW-094TKU053920012016-06-01T04:14:21Z http://ndltd.ncl.edu.tw/handle/14397586654544342220 A Study of Authentication Protocol for Mobile Networks 行動通訊網路鑑別技術之研究 Feng-Fu Su 蘇豐富 博士 淡江大學 資訊工程學系博士班 94 In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Yet, mainstream mobile manufacturers can hardly adopt advanced security protocol to mobile devices, due to the limited computational ability of the processor they employ. Against the backdrop that many good authentication protocols of mobile network are based on RSA operations, the author of this dissertation shall design and propose some implementation methods and authentication protocols. First, the author designs an efficient and practical method to implement RSA algorithm originated from Texas Instruments TMS320C55x family, in order to make it possible to add an advanced security protocol to mobile networks. The TMS320C55x family is widely adopted in many wireless and mobile devices. While most of these RSA applications use a small public key to speed up the encryption operation, the decryption operation inevitably takes more computational time performing an operation of modular exponentiation. To solve this problem, the author proposes a RSA decryption method based on the strong prime criterion. The proposed method can greatly enhance the performance of the RSA decryption. The author proposes some implementation methods of public key cryptosystem to enhance the performance; however, the public key cryptosystem is still slower than the symmetric key cryptosystem. Finally, the author proposes a new efficient authentication protocol for mobile networks. The proposed protocol is based on the symmetric cryptosystem, challenge-response, and hash chaining, in which the user, the service provider, and the key distribution center authenticate mutually. In addition, the user and the service provider will generate a secret session key for their communication in this protocol. With the key derivation function, the key distribution center of mobile networks does not need to maintain the secret key database of users. The proposed protocol can be properly applied to the mobile networks. 黃仁俊 2006 學位論文 ; thesis 84 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 淡江大學 === 資訊工程學系博士班 === 94 === In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Yet, mainstream mobile manufacturers can hardly adopt advanced security protocol to mobile devices, due to the limited computational ability of the processor they employ. Against the backdrop that many good authentication protocols of mobile network are based on RSA operations, the author of this dissertation shall design and propose some implementation methods and authentication protocols. First, the author designs an efficient and practical method to implement RSA algorithm originated from Texas Instruments TMS320C55x family, in order to make it possible to add an advanced security protocol to mobile networks. The TMS320C55x family is widely adopted in many wireless and mobile devices. While most of these RSA applications use a small public key to speed up the encryption operation, the decryption operation inevitably takes more computational time performing an operation of modular exponentiation. To solve this problem, the author proposes a RSA decryption method based on the strong prime criterion. The proposed method can greatly enhance the performance of the RSA decryption. The author proposes some implementation methods of public key cryptosystem to enhance the performance; however, the public key cryptosystem is still slower than the symmetric key cryptosystem. Finally, the author proposes a new efficient authentication protocol for mobile networks. The proposed protocol is based on the symmetric cryptosystem, challenge-response, and hash chaining, in which the user, the service provider, and the key distribution center authenticate mutually. In addition, the user and the service provider will generate a secret session key for their communication in this protocol. With the key derivation function, the key distribution center of mobile networks does not need to maintain the secret key database of users. The proposed protocol can be properly applied to the mobile networks.
author2 黃仁俊
author_facet 黃仁俊
Feng-Fu Su
蘇豐富
author Feng-Fu Su
蘇豐富
spellingShingle Feng-Fu Su
蘇豐富
A Study of Authentication Protocol for Mobile Networks
author_sort Feng-Fu Su
title A Study of Authentication Protocol for Mobile Networks
title_short A Study of Authentication Protocol for Mobile Networks
title_full A Study of Authentication Protocol for Mobile Networks
title_fullStr A Study of Authentication Protocol for Mobile Networks
title_full_unstemmed A Study of Authentication Protocol for Mobile Networks
title_sort study of authentication protocol for mobile networks
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/14397586654544342220
work_keys_str_mv AT fengfusu astudyofauthenticationprotocolformobilenetworks
AT sūfēngfù astudyofauthenticationprotocolformobilenetworks
AT fengfusu xíngdòngtōngxùnwǎnglùjiànbiéjìshùzhīyánjiū
AT sūfēngfù xíngdòngtōngxùnwǎnglùjiànbiéjìshùzhīyánjiū
AT fengfusu studyofauthenticationprotocolformobilenetworks
AT sūfēngfù studyofauthenticationprotocolformobilenetworks
_version_ 1718286671801221120