毕业设计(论文)译文部分(原文)

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

The Authentication and Key Agreement Protocol Based on ECC for Wireless Communications

Zhang Juan

College of Management, Xi’an Technology of University,

XATU

Xi’an ,China

zhangj99999@

Deng fangmin

Xidian University,

XiDian

Xi’an , China coopoo066@

Abstract—In this paper, We proposed An efficient Authentication and key Agreement Protocol based on Elliptic Curve Cryptography (ECC). By which user to user, or user to network in the wireless communication system can authenticate one another and agree on a session key. We introduced ECC to the Diffie-Hellman Key Exchange Protocol, and added new Authentication Scheme using a certificate in the protocol. The use of ECC techniques provide greater security using fewer bits, resulting the protocol which requires significantly less bandwidth, and furthermore, it has lower computational burden and storage requirements on the user side.

Keywords-Wireless communication protocol;ECC; Mutual authentication;Key agreement

I.INTRODUCTION

Today, mobile communications technology has evolution for satisfying the customer needs continuously. It is expected for the future mobile communications to provide safety, health care, convenience, pervasive environments, knowledge based, high culture life, and human relationship services to users in time of beyond 2nd generation. With the popularity of mobile communication, the security of mobile networks becomes more and more important. However, due to the computation limitation, many existing authentication key agreement protocols are not suitable for wireless mobile networks. People find that using the protocol of public-key cryptosystem can solve these problems effectively, so in recent years, some protocol based on public-key cryptosystem has been proposed. For example, the well-known Yacobi - Shmuely Protocol (Yacobi etc, 1989) [1], ASK protocol (M. Aydos etc, 1998) [2], ASPeCT Protocol (Horn et al. 1998) [3] and so on. ASK Protocol and ASPeCT are based on elliptic curve cryptosystem which has 和higher efficiency in the current public-key cryptosystem field. The experiment ASK protocol in micro-operating system on the efficiency of the

implementation has been confirmed. Unfortunately, it has been proved that the ASK protocol exist the defect of being attacked by Known key, even can not complete the mutual authentication, and also has certain problems on user identity confidentiality. In this paper, we make construct a fast authentication and key agreement protocol based on elliptic curve cryptosystem Referred to as ECC-AKAP. The protocol evades the problems which exist in the above-mentioned protocols, achieves security conversation authentication and key agreement between arbitrary mobile users or between mobile users and network.

A key agreement protocol is said to provide implicit key authentication if entity A is assured that no other entity aside from a specifically identified second entity

B can possibly learn the value of a particular secret key.

In 2005, Sui et al. proposed an efficient authentication key agreement protocol, but their protocol can not resist the off-line password guessing attack. Therefore, Lu et al. present an enhanced authentication key agreement protocol to against this attack. However, we find that their protocol can not withstand the parallel guessing attack. Here, we propose an improved authentication key agreement protocol based on elliptic curve Cryptography for wireless mobile networks.

II.PRELIMINARIES

A.Definitions and Notations

An elliptic curve over the finite field Z q is defined as the set of points (x, y), satisfying the elliptic curve equation y2≡x3 + ax + b mod q, where x, y, a and b are the elements of the field. Note that the condition 4a3 + 27b2≡ 0 mod q should be met.

h( ): one-way hash function

q: a large prime(q≥3)

978-1-4244-4639-1/09/$25.00 ©2009 IEEE

相关文档
最新文档