Novel Authentication Algorithm – Public Key Based Cryptography in Mobile Phone Systems
نویسنده
چکیده
Nowadays in the field of telecommunications and computer sciences the most important part of development is security. In UMTS, the weaknesses of GSM solved but some problems in the security area are revealed, e.g. the IMSI is plain on the air interface. We introduce our novel authentication algorithm which solves this fault. The GSZV algorithm is based on public key infrastructure which is used in the computer network security. Because of the convergence of various telecommunication systems it is worth considering the utilization of public key cryptography in mobile phone systems. Our method is an example of how this kind of cryptography can be used.
منابع مشابه
Efficient Authentication Protocols for Mobile Hand-held Devices with Minimum Power Consumption
Mobile phone in day-to-day life has become an important communication device, subjected from formal and informal talks to sharing important and secure information. These secure information falls from personal communication to large business deals. Hence, there is a necessity to ensure security to the applications that are used to transfer confidential information. In order to satisfy the users’...
متن کاملA hybrid approach to secure hierarchical mobile IPv6 networks
Establishing secure access and communications in a hierarchical mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on public key infrastructure (PKI) or identity-based cryptography (IBC). However, these solutions suffer from either efficiency or scalability proble...
متن کاملTrusted key management with RSA Based Security Policy for MANETS
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various key management authorities distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. Thus many efforts have been made to adapt key management authority’s tasks to the dynamic environmen...
متن کاملA novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial pro...
متن کاملA Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems
Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mo...
متن کامل