An optimized authentication protocol for mobile network reconsidered

  • Authors:
  • Duncan S. Wong

  • Affiliations:
  • College of Computer Science, Northeastern University, Boston, MA 02115, U.S.A.

  • Venue:
  • ACM SIGMOBILE Mobile Computing and Communications Review
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In [6], an authenticated key transport protocol was proposed for establishing secure communications between a base station and a mobile unit. The protocol is public-key based and relies on certificates to validate public keys of communicating parties. A signature scheme was also proposed and used in the certification mechanism of the protocol. We find that the signature scheme is vulnerable to an attack which allows an adversary to generate a signature on any message at its will. In this paper, we describe the attack and explain how the entire system can be compromised by an intruder after eavesdropping only one single run of the protocol.