Abstract
Forward secrecy and user anonymity are provided in the WTLS for the wireless Internet communications. Forward secrecy can be built by using Diffie-Hellman key agreement with random numbers in the Hello messages, and user anonymity by employing the signcryption scheme to the ClientKeyExchange and CertificateVerify procedure. In addition to these features, the modified WTLS handshake protocol has mutual authentication and key agreement against man-in-the-middle attacks. The resulting security features, bandwidth efficiency, and computational load are analyzed in comparison with the existing WTLS.
This research has been partially supported by Mobile Security Research Center, Kyungpook National University, Korea.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
C. Gunther: An Identity-based Key-exchange Protocol, Advances in Cryptology-Eurocrypto’89, Springer-Verlag, 1990, pp. 29–37, 1989.
A. Aziz: SKIP Extension for Perfect Forward Secrecy, Available from http://www.skip-vpm.org/wetice98/HacknSlash.html.
M. Bellare and S. K. Miner: A Forward-Secure Digital Signature Scheme, Advances in Cryptology-Crypto’ 99, Springer-Verlag, 1999.
D. Park, C. Boyd, and S. Moon: Forward Secrecy and Its Application to Future Mobile Communications Security, PKC2000, LNCS 1751, Spring-Verlag, 2000, pp. 433–445, Jan. 2000.
K. Lee, S. Moon, W. Jeong, and T. Kim: A-2-pass Authentication and Key Agreement Protocol for Mobile Communications, Proceedings of The 2nd International Conference on Information Security and Cryptology, ICISC’99, pp. 143–155, Dec.1999.
K. Lee and S. Moon: AKA Protocols for Mobile Communications, Proceedings of 6th Australasian Conference Information Security and Privacy, ACISP2000, pp. 400–411, July 2000.
Y. Zheng: Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption), Advances in Cryptology-CRYPTO’97, LNCS 1294, pp. 165–179, Aug. 1997.
F. Bao and R. H. Deng: A signcryption scheme with signature directly verifiable by public key, Proc. of PKC’98, LNCS 1431, pp. 55–59, 1998.
R. L. Rivest, A. Shamir, and L. M. Adleman: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol.21, No.2, pp. 120–126, Feb. 1978
W. Diffe and M. E. Hellman: New direction in Cryptography, IEEE Trans. On Information Theory, Vol.22, No.6, pp. 644–654, Nov.1976
V. Miller: Uses of elliptic curves in cryptography, In H. C. Williams, editor, Advances in Cryptology-Crypto’ 85, LNCS 218, pp. 417–426, 1985.
N. Koblitz: Elliptic curve cryptosystems, Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987.
A. J. Menezes: Elliptic Curve Public Key Cryptosystems, Boston, MA: Kluwer Academic Publishers, 1993.
Y. Zheng: An authentication and security protocol for mobile computing, Proceedings of IFIP, pp. 249–257, Sep. 1996.
G. Horn and B. Preneel: Authentication and payment in future mobile systems, Compute Security-ESORICS’98, LNCS 1485, pp. 277–293, Sep. 1998.
H. Petersen and M. Michels: Cryptanalysis and improvement of signcryption schemes, IEE Proc. Comput. Digit. Tech., vol. 145, no. 2, 1998.
T. ElGamal: A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, vol.31, no. 4, pp. 469–472, Jul. 1985.
G. Horn, K. M. Martin, and C. J. Mitchell: Authentication protocols for mobile network environment value-added services, draft, available at http://isg.rhbnc.ac.uk/cjm/Chris Mitchell.htm.
A. J. Manezes, P. C. van Oorshot, and S. A. Vanstone: Handbook of Applied Cryptography, Boca Raton: CRC Press, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jin Kwak, D., Ha, J., Jae Lee, H., Koo Kim, H., Jae Moon co, S. (2003). A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. In: Lee, J., Kang, CH. (eds) Mobile Communications. CIC 2002. Lecture Notes in Computer Science, vol 2524. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36555-9_23
Download citation
DOI: https://doi.org/10.1007/3-540-36555-9_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00732-6
Online ISBN: 978-3-540-36555-6
eBook Packages: Springer Book Archive