Comments on an optimized protocol for mobile network authentication and security
ACM SIGMOBILE Mobile Computing and Communications Review
Author's reply to "comments on an optimized protocol for mobile network authentication and security"
ACM SIGMOBILE Mobile Computing and Communications Review
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Improvement on an optimized protocol for mobile network authentication and security
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |
In [6], an authenticated key transport protocol was proposed for establishing secure communications between a base station and a mobile unit. The protocol is public-key based and relies on certificates to validate public keys of communicating parties. A signature scheme was also proposed and used in the certification mechanism of the protocol. We find that the signature scheme is vulnerable to an attack which allows an adversary to generate a signature on any message at its will. In this paper, we describe the attack and explain how the entire system can be compromised by an intruder after eavesdropping only one single run of the protocol.