Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2003-09-10
2009-08-11
Zand, Kambiz (Department: 2434)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S169000, C713S170000
Reexamination Certificate
active
07574599
ABSTRACT:
Embodiments of the invention may be used to provide an authentication and key agreement protocol that is more robust against base station, replay and other attacks compared to previously known systems. The nonce-based authentication and key agreement protocol provides security against such attacks while avoiding the problems that arise in systems that use sequence number counters on the home environment and mobile station-sides. In an embodiment, a nonce that is transmitted from the user to the home environment through the serving network, as well as subsequent values for the nonce that are derived from the initial nonce, are used as indices for authentication vectors.
REFERENCES:
patent: 6711400 (2004-03-01), Aura
patent: 2003/0157926 (2003-08-01), Ala-Laurila et al.
patent: 2003/0166398 (2003-09-01), Netanel
Pütz (Stefan Pütz, Roland Schmitz, Tobias Martin, “Security Mechanisms in UMTS”, Datenschutz, and Datensicherheit (DUD), vol. 25, pp. 1-10, 2001), http://fb1.hdm-stuttgart.de/skripte/Internetsecurity—2/Papers/UMTS-SecurityMechanisms.pdf.
Anita Singhrova, Rita Mahajan, Performance Analysis of 3G Protocol: Encryption and Authentication, http://www.comp.brad.ac.uk/het-net/tutorials/P10.pdf.
Hung-Yu Lin and Lein Harn “Authentication Protocols for Personal Communication Systems”, SIGCOMM '95 Cambridge, MA USA (1995).
Chii-Hwa Lee, Min-Shiang Hwang and Wei-Pang Yang “Enhanced Privacy and Authentication for the Global System for Mobile Communications”, Wireless Networks 5 (1999) 231-243.
“Information Technology—Security techniques—Entity authentication—Part 4: Mechanisms using a cryptographic check function” International Standard ISO/IEC 9798-4, Second Edition Dec. 15, 1999.
“European digital cellular telecommunication system (phase 1); Security Related Network Functions Part 2”, ETSI, GSM 03.20—EXT Version: 3.0.0, Jun. 25, 1993.
“European digital cellular telecommunication system (phase 1); Security-related Network Functions”, ETSI, GSM 03.20 Version 3.3.2 (1992).
Digital cellular telecommunications system (Phase 2+); Security related network functions, ETSI, GSM 03.20 version 8.1.0 Release 1999.
Lein Harn and Hung-Yu Lin “Modifications to Enhance the Security of the GSM Protocol”, Proceedings of the 5th National Conference on Information Security, Taiwan, pp. 74-76 (1995).
Poltorak Peter
Verizon Laboratories Inc.
Zand Kambiz
LandOfFree
Robust authentication and key agreement protocol for... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Robust authentication and key agreement protocol for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Robust authentication and key agreement protocol for... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4132694