Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Cryptoanalysis of the Cellular Encryption Algorithm
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Security protocols for 2G and 3G wireless communications
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Improved authentication scheme in W-CDMA networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Hi-index | 0.00 |
Since being exposed to public scrutiny, the major algorithms used in CDMA digital wireless standard are already broken. However, being a closed door algorithm, the security analysis of the CDMA authentication and key-establishment protocol has not been explored in detail. In this work we have presented an analysis of the basic CDMA authentication protocol. We have pointed out some shortcomings in the existing protocol and have proposed an authentication protocol which alleviates the shortcomings. Moreover, the existing scheme provides no security of communication between the home and visited networks. It leaves a security threat. We complement the threat by proposing a secure protocol for communication between the two. Thus, this work opens an avenue for design and analysis of authentication protocols in CDMA networks.