40 likes | 159 Views
A New Authentication Scheme with Anonymity for Wireless Environments. J. Zhu and J. Ma IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 230-234, 2004. Initial Assumptions. HA. MN. PW MN. N: random number PW MN =h(N||ID MN ) r=h(N||IDHA) ⊕ h(N||IDMN) ⊕ ID HA ⊕ ID MN.
E N D
A New Authentication Scheme with Anonymity for Wireless Environments J. Zhu and J. Ma IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 230-234, 2004
Initial Assumptions HA MN PWMN N: random number PWMN=h(N||IDMN) r=h(N||IDHA) ⊕ h(N||IDMN) ⊕ IDHA ⊕ IDMN (secure channel) Smard card (r, IDHA, h)
First Phase HA MN FA n, (x0)L, IDHA, TMN b, n, (x0)L, TMN, CertFA, n=r ⊕ PWMN x0:random L=h(TMN ⊕ PWMN) TFA, EKRFA(h(above messages)) IDMN=h(N||IDHA) ⊕ n ⊕ IDHA Compute L and x0 c, EKUFA(h(IDMN)||x0), CertHA, THA, EKRHA(h(above and b)) (TCertMN)K k=h(IDMN) ⊕ x0
Second Phase When MN visits FA at i th session MN FA (TCertMN), (xi||TCertMN||other info.)ki ki=h(IDMN) ⊕ xi-1