1 / 14

[ICE615] Network Security

[ICE615] Network Security. [ Term Project Mid-Presentation ]. Mutual Authentication and Key Exchange For Wireless Communications. 2002. 10. 10 (Thu). Song-Won Lee 20022099 School of Engineering. [ICE615] Network Security. Contents. Introduction Project Goal Preliminaries

Download Presentation

[ICE615] Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. [ICE615] Network Security [ Term Project Mid-Presentation ] Mutual Authentication and Key Exchange For Wireless Communications 2002. 10. 10 (Thu) • Song-Won Lee • 20022099 • School of Engineering

  2. [ICE615] Network Security Contents Introduction Project Goal Preliminaries Previous Works Future Works References

  3. [ICE615] Network Security Introduction (1/2) Characteristics The Wireless Communications are characterized by: • Limited power of wireless devices • Wireless environment limited in bandwidth • Communication medium • Mobility, … These constraints have prevented a adoption of cryptographic protocols to wireless networks for authentication and security.

  4. [ICE615] Network Security Introduction (2/2) Why Authentication Due to the mobility of a wireless terminal, the network does not have any information about the identity of the terminal until a connection is made. • Verifying an identity • Client(wireless device) authentication • Host(base station) authentication

  5. [ICE615] Network Security Project Goal In this term-project, I would like to propose efficient Mutually Authenticated Key Exchanged Protocols, they are suitable for establishing secure communications between a low-power wireless device and a powerful base station.

  6. [ICE615] Network Security Preliminaries (1/3) Requirements Desired security features : • Session key establishment • Caller ID confidentiality • Mutual authentication • Non-repudiation of services Implementation requirements : • Efficiency and effectiveness in terms of computational complexity, memory demand and bandwidth requirement • Minimal user interventions

  7. [ICE615] Network Security Preliminaries (2/3) Authentication Protocols One-way : • Password • Challenge/response • Public Key Two-way (mutual authentication) : • Trusted intermediary • Public Key

  8. [ICE615] Network Security Preliminaries (3/3) Abstract Protocol using PKC AB (PKA, SKA) (PKB, SKB) rA,CertA=<IDA,PKA,SigTA(IDA,PKA)> rA← {0,1}k cB← {0,1}k β = EPKA(cB) SB=ESKB(IDA ,rA ,β) rB← {0,1}k rB ,β,SB,CertB=<IDB,PKB,SigTA(IDB,PKB)> cA← {0,1}k α= EPKB(cA) SA=ESKA(IDB ,rB ,α) α,SA σ =cA  cB σ =cA  cB

  9. [ICE615] Network Security Previous Works (1/2) [Proposed by D.Wong and A.Chan] Server-specific Protocol AB KA (PKB, SKB) EKA(rA), CertAB rA← {0,1}k rB← {0,1}k EKA(rA, rB ,IDB ) EKA(rB) σ=rA  rB σ=rA  rB Before running the protocol, A first obtains a certificate from TA, given by CertAB =< IDA,EPKB(KA),SigTA(IDA,EPKB(KA))>.

  10. [ICE615] Network Security Previous Works (2/2) Linear Protocol AB {a1,…,a2i-1,a2i,…,a2n} R Zp-1 (PKB, SKB) {ga1,…,ga2i-1,ga2i,…, ga2n} Zp* Cert iA =<IDA,ga2i-1,ga2i,SigTA(IDA, ga2i-1,ga2i)> rBR Zp-1 rB rA← {0,1}k x=EPKB(rB) y= a2i-1(xrB) + a2i mod (p-1) x, y σ=rA  rB (ga2i-1) x  rBga2i ?g y(mod p) σ=rA  rB Eσ(x)

  11. [ICE615] Network Security Conclusions More efficient protocols • The number of times to perform the cryptographic operations • The sizes of the messages • The total number of messages transmitted Satisfying security goals as well.

  12. [ICE615] Network Security Future Works • Study on Wireless Network in more detail, with respect to security issues • Research more of the previous related works, and figure out challenging problems • Develop improved Authentication and Key Agreement protocols focused on efficiency and effectiveness, …

  13. [ICE615] Network Security References [1] M.Bellare and P.Rogaway, Entity Authentication and Key Distribution, Crypto’93, LNCS 773, pp.232-249, 1994 [2] H.Lin and L.Harn, Authentication Protocols for Personal Communication Systems, SIGCOMM’95 [3] D.Wong and A.Chan, Mutual Authentication and Key Exchange for Low Power Wireless Communications, IEEE MILCOM 2001 [4] M.Jakobsson and D.Pointcheval, Mutual Authentication for Low-Power Mobile Devices, FC 2001, LNCS 2339, pp.178-195, 2002 [5] H.Lin, L.Harn and V.Kumar, Authentication Protocols in Wireless Communications, ICAUTO ’95 [6] J.Go and K.Kim, Wireless Authentication Protocol Preserving User Anonymity, SCIS 2001

  14. [ICE615] Network Security Thanks a lot

More Related