A WTLS Handshake Protocol with User Anonymity and Forward Secrecy | SpringerLink
Skip to main content

A WTLS Handshake Protocol with User Anonymity and Forward Secrecy

  • Conference paper
  • First Online:
Mobile Communications (CIC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2524))

Included in the following conference series:

  • 481 Accesses

Abstract

Forward secrecy and user anonymity are provided in the WTLS for the wireless Internet communications. Forward secrecy can be built by using Diffie-Hellman key agreement with random numbers in the Hello messages, and user anonymity by employing the signcryption scheme to the ClientKeyExchange and CertificateVerify procedure. In addition to these features, the modified WTLS handshake protocol has mutual authentication and key agreement against man-in-the-middle attacks. The resulting security features, bandwidth efficiency, and computational load are analyzed in comparison with the existing WTLS.

This research has been partially supported by Mobile Security Research Center, Kyungpook National University, Korea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. C. Gunther: An Identity-based Key-exchange Protocol, Advances in Cryptology-Eurocrypto’89, Springer-Verlag, 1990, pp. 29–37, 1989.

    Google Scholar 

  2. A. Aziz: SKIP Extension for Perfect Forward Secrecy, Available from http://www.skip-vpm.org/wetice98/HacknSlash.html.

  3. M. Bellare and S. K. Miner: A Forward-Secure Digital Signature Scheme, Advances in Cryptology-Crypto’ 99, Springer-Verlag, 1999.

    Google Scholar 

  4. D. Park, C. Boyd, and S. Moon: Forward Secrecy and Its Application to Future Mobile Communications Security, PKC2000, LNCS 1751, Spring-Verlag, 2000, pp. 433–445, Jan. 2000.

    Google Scholar 

  5. K. Lee, S. Moon, W. Jeong, and T. Kim: A-2-pass Authentication and Key Agreement Protocol for Mobile Communications, Proceedings of The 2nd International Conference on Information Security and Cryptology, ICISC’99, pp. 143–155, Dec.1999.

    Google Scholar 

  6. K. Lee and S. Moon: AKA Protocols for Mobile Communications, Proceedings of 6th Australasian Conference Information Security and Privacy, ACISP2000, pp. 400–411, July 2000.

    Google Scholar 

  7. Y. Zheng: Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption), Advances in Cryptology-CRYPTO’97, LNCS 1294, pp. 165–179, Aug. 1997.

    Chapter  Google Scholar 

  8. F. Bao and R. H. Deng: A signcryption scheme with signature directly verifiable by public key, Proc. of PKC’98, LNCS 1431, pp. 55–59, 1998.

    Google Scholar 

  9. R. L. Rivest, A. Shamir, and L. M. Adleman: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol.21, No.2, pp. 120–126, Feb. 1978

    Article  MATH  MathSciNet  Google Scholar 

  10. W. Diffe and M. E. Hellman: New direction in Cryptography, IEEE Trans. On Information Theory, Vol.22, No.6, pp. 644–654, Nov.1976

    Article  Google Scholar 

  11. V. Miller: Uses of elliptic curves in cryptography, In H. C. Williams, editor, Advances in Cryptology-Crypto’ 85, LNCS 218, pp. 417–426, 1985.

    Google Scholar 

  12. N. Koblitz: Elliptic curve cryptosystems, Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987.

    Article  MATH  MathSciNet  Google Scholar 

  13. A. J. Menezes: Elliptic Curve Public Key Cryptosystems, Boston, MA: Kluwer Academic Publishers, 1993.

    MATH  Google Scholar 

  14. Y. Zheng: An authentication and security protocol for mobile computing, Proceedings of IFIP, pp. 249–257, Sep. 1996.

    Google Scholar 

  15. G. Horn and B. Preneel: Authentication and payment in future mobile systems, Compute Security-ESORICS’98, LNCS 1485, pp. 277–293, Sep. 1998.

    Chapter  Google Scholar 

  16. H. Petersen and M. Michels: Cryptanalysis and improvement of signcryption schemes, IEE Proc. Comput. Digit. Tech., vol. 145, no. 2, 1998.

    Google Scholar 

  17. T. ElGamal: A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, vol.31, no. 4, pp. 469–472, Jul. 1985.

    Article  MATH  MathSciNet  Google Scholar 

  18. G. Horn, K. M. Martin, and C. J. Mitchell: Authentication protocols for mobile network environment value-added services, draft, available at http://isg.rhbnc.ac.uk/cjm/Chris Mitchell.htm.

  19. A. J. Manezes, P. C. van Oorshot, and S. A. Vanstone: Handbook of Applied Cryptography, Boca Raton: CRC Press, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin Kwak, D., Ha, J., Jae Lee, H., Koo Kim, H., Jae Moon co, S. (2003). A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. In: Lee, J., Kang, CH. (eds) Mobile Communications. CIC 2002. Lecture Notes in Computer Science, vol 2524. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36555-9_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-36555-9_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00732-6

  • Online ISBN: 978-3-540-36555-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics