A Beyond-5G Authentication and Key Agreement Protocol

نویسندگان

چکیده

The standardized Authentication and Key Agreement protocol for 5G networks (5G AKA) have several security privacy vulnerabilities. In this paper, we propose a novel authentication key agreement beyond that is compatible with the AKA. Our has properties, e.g., perfect forward secrecy, resistance against linkability attacks, protection malicious SNs. Moreover, both user identity secrecy are handled using Encapsulation Mechanisms (KEM), which makes our adaptable to quantum-safe setting. To analyze performance of proposed protocol, use post-quantum KEM CRYSTALS-Kyber, recently chosen be by NIST, NIST Round 4 candidate KEMs. results communication computation costs show utilizing feasible in practice sometimes outperforms public-key cryptography used AKA, i.e., ECIES. We further prove ProVerif.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ironwood Meta Key Agreement and Authentication Protocol

Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...

متن کامل

A Novel Extensible Authentication Protocol Based Group Authentication and Key Agreement Protocol for Wireless Networking

By utilizing the broadcast nature of radio channels, cooperative wireless communications exploits a brand new degree of freedom to combat unfavorable wireless channel conditions with the help of relays. The transmission reliableness and rates achieved by cooperation for various communication eventualities and cooperation schemes are extensively studied. However, additionally to the benefits it ...

متن کامل

An Efficient Authentication and Key Agreement Protocol in RFID System

Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...

متن کامل

An Efficient ECC-based Authentication and Key Agreement Protocol

Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-23020-2_14