140 likes | 327 Views
[ICE615] Network Security. [ Term Project Mid-Presentation ]. Mutual Authentication and Key Exchange For Wireless Communications. 2002. 10. 10 (Thu). Song-Won Lee 20022099 School of Engineering. [ICE615] Network Security. Contents. Introduction Project Goal Preliminaries
E N D
[ICE615] Network Security [ Term Project Mid-Presentation ] Mutual Authentication and Key Exchange For Wireless Communications 2002. 10. 10 (Thu) • Song-Won Lee • 20022099 • School of Engineering
[ICE615] Network Security Contents Introduction Project Goal Preliminaries Previous Works Future Works References
[ICE615] Network Security Introduction (1/2) Characteristics The Wireless Communications are characterized by: • Limited power of wireless devices • Wireless environment limited in bandwidth • Communication medium • Mobility, … These constraints have prevented a adoption of cryptographic protocols to wireless networks for authentication and security.
[ICE615] Network Security Introduction (2/2) Why Authentication Due to the mobility of a wireless terminal, the network does not have any information about the identity of the terminal until a connection is made. • Verifying an identity • Client(wireless device) authentication • Host(base station) authentication
[ICE615] Network Security Project Goal In this term-project, I would like to propose efficient Mutually Authenticated Key Exchanged Protocols, they are suitable for establishing secure communications between a low-power wireless device and a powerful base station.
[ICE615] Network Security Preliminaries (1/3) Requirements Desired security features : • Session key establishment • Caller ID confidentiality • Mutual authentication • Non-repudiation of services Implementation requirements : • Efficiency and effectiveness in terms of computational complexity, memory demand and bandwidth requirement • Minimal user interventions
[ICE615] Network Security Preliminaries (2/3) Authentication Protocols One-way : • Password • Challenge/response • Public Key Two-way (mutual authentication) : • Trusted intermediary • Public Key
[ICE615] Network Security Preliminaries (3/3) Abstract Protocol using PKC AB (PKA, SKA) (PKB, SKB) rA,CertA=<IDA,PKA,SigTA(IDA,PKA)> rA← {0,1}k cB← {0,1}k β = EPKA(cB) SB=ESKB(IDA ,rA ,β) rB← {0,1}k rB ,β,SB,CertB=<IDB,PKB,SigTA(IDB,PKB)> cA← {0,1}k α= EPKB(cA) SA=ESKA(IDB ,rB ,α) α,SA σ =cA cB σ =cA cB
[ICE615] Network Security Previous Works (1/2) [Proposed by D.Wong and A.Chan] Server-specific Protocol AB KA (PKB, SKB) EKA(rA), CertAB rA← {0,1}k rB← {0,1}k EKA(rA, rB ,IDB ) EKA(rB) σ=rA rB σ=rA rB Before running the protocol, A first obtains a certificate from TA, given by CertAB =< IDA,EPKB(KA),SigTA(IDA,EPKB(KA))>.
[ICE615] Network Security Previous Works (2/2) Linear Protocol AB {a1,…,a2i-1,a2i,…,a2n} R Zp-1 (PKB, SKB) {ga1,…,ga2i-1,ga2i,…, ga2n} Zp* Cert iA =<IDA,ga2i-1,ga2i,SigTA(IDA, ga2i-1,ga2i)> rBR Zp-1 rB rA← {0,1}k x=EPKB(rB) y= a2i-1(xrB) + a2i mod (p-1) x, y σ=rA rB (ga2i-1) x rBga2i ?g y(mod p) σ=rA rB Eσ(x)
[ICE615] Network Security Conclusions More efficient protocols • The number of times to perform the cryptographic operations • The sizes of the messages • The total number of messages transmitted Satisfying security goals as well.
[ICE615] Network Security Future Works • Study on Wireless Network in more detail, with respect to security issues • Research more of the previous related works, and figure out challenging problems • Develop improved Authentication and Key Agreement protocols focused on efficiency and effectiveness, …
[ICE615] Network Security References [1] M.Bellare and P.Rogaway, Entity Authentication and Key Distribution, Crypto’93, LNCS 773, pp.232-249, 1994 [2] H.Lin and L.Harn, Authentication Protocols for Personal Communication Systems, SIGCOMM’95 [3] D.Wong and A.Chan, Mutual Authentication and Key Exchange for Low Power Wireless Communications, IEEE MILCOM 2001 [4] M.Jakobsson and D.Pointcheval, Mutual Authentication for Low-Power Mobile Devices, FC 2001, LNCS 2339, pp.178-195, 2002 [5] H.Lin, L.Harn and V.Kumar, Authentication Protocols in Wireless Communications, ICAUTO ’95 [6] J.Go and K.Kim, Wireless Authentication Protocol Preserving User Anonymity, SCIS 2001
[ICE615] Network Security Thanks a lot