Robust authentication and key agreement protocol for...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S169000, C713S170000

Reexamination Certificate

active

07574599

ABSTRACT:
Embodiments of the invention may be used to provide an authentication and key agreement protocol that is more robust against base station, replay and other attacks compared to previously known systems. The nonce-based authentication and key agreement protocol provides security against such attacks while avoiding the problems that arise in systems that use sequence number counters on the home environment and mobile station-sides. In an embodiment, a nonce that is transmitted from the user to the home environment through the serving network, as well as subsequent values for the nonce that are derived from the initial nonce, are used as indices for authentication vectors.

REFERENCES:
patent: 6711400 (2004-03-01), Aura
patent: 2003/0157926 (2003-08-01), Ala-Laurila et al.
patent: 2003/0166398 (2003-09-01), Netanel
Pütz (Stefan Pütz, Roland Schmitz, Tobias Martin, “Security Mechanisms in UMTS”, Datenschutz, and Datensicherheit (DUD), vol. 25, pp. 1-10, 2001), http://fb1.hdm-stuttgart.de/skripte/Internetsecurity—2/Papers/UMTS-SecurityMechanisms.pdf.
Anita Singhrova, Rita Mahajan, Performance Analysis of 3G Protocol: Encryption and Authentication, http://www.comp.brad.ac.uk/het-net/tutorials/P10.pdf.
Hung-Yu Lin and Lein Harn “Authentication Protocols for Personal Communication Systems”, SIGCOMM '95 Cambridge, MA USA (1995).
Chii-Hwa Lee, Min-Shiang Hwang and Wei-Pang Yang “Enhanced Privacy and Authentication for the Global System for Mobile Communications”, Wireless Networks 5 (1999) 231-243.
“Information Technology—Security techniques—Entity authentication—Part 4: Mechanisms using a cryptographic check function” International Standard ISO/IEC 9798-4, Second Edition Dec. 15, 1999.
“European digital cellular telecommunication system (phase 1); Security Related Network Functions Part 2”, ETSI, GSM 03.20—EXT Version: 3.0.0, Jun. 25, 1993.
“European digital cellular telecommunication system (phase 1); Security-related Network Functions”, ETSI, GSM 03.20 Version 3.3.2 (1992).
Digital cellular telecommunications system (Phase 2+); Security related network functions, ETSI, GSM 03.20 version 8.1.0 Release 1999.
Lein Harn and Hung-Yu Lin “Modifications to Enhance the Security of the GSM Protocol”, Proceedings of the 5th National Conference on Information Security, Taiwan, pp. 74-76 (1995).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Robust authentication and key agreement protocol for... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Robust authentication and key agreement protocol for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Robust authentication and key agreement protocol for... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4132694

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.