A Beyond-5G Authentication and Key Agreement Protocol
نویسندگان
چکیده
The standardized Authentication and Key Agreement protocol for 5G networks (5G AKA) have several security privacy vulnerabilities. In this paper, we propose a novel authentication key agreement beyond that is compatible with the AKA. Our has properties, e.g., perfect forward secrecy, resistance against linkability attacks, protection malicious SNs. Moreover, both user identity secrecy are handled using Encapsulation Mechanisms (KEM), which makes our adaptable to quantum-safe setting. To analyze performance of proposed protocol, use post-quantum KEM CRYSTALS-Kyber, recently chosen be by NIST, NIST Round 4 candidate KEMs. results communication computation costs show utilizing feasible in practice sometimes outperforms public-key cryptography used AKA, i.e., ECIES. We further prove ProVerif.
منابع مشابه
Ironwood Meta Key Agreement and Authentication Protocol
Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...
متن کاملA Novel Extensible Authentication Protocol Based Group Authentication and Key Agreement Protocol for Wireless Networking
By utilizing the broadcast nature of radio channels, cooperative wireless communications exploits a brand new degree of freedom to combat unfavorable wireless channel conditions with the help of relays. The transmission reliableness and rates achieved by cooperation for various communication eventualities and cooperation schemes are extensively studied. However, additionally to the benefits it ...
متن کاملAn Efficient Authentication and Key Agreement Protocol in RFID System
Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...
متن کاملAn Efficient ECC-based Authentication and Key Agreement Protocol
Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2022
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-23020-2_14