网站大量收购独家精品文档,联系QQ:2885784924

Key establishment protocols for secure mobile communications A selective survey文档.pdf

Key establishment protocols for secure mobile communications A selective survey文档.pdf

  1. 1、本文档共12页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Key establishment protocols for secure mobile communications A selective survey文档

Key Establishment Protocols for Secure Mobile Communications: A Selective Survey Colin BoydI and Anish Mathuria2 Information Security Research Centre, School of Data Communications Queensland University of Technology,Brisbane Q4001 AUSTRALIA boyd@f it. qut. edu. au 2 IBM Research, Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-0001 JAPAN anish@trl, ibm. co. jp Abstract. We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases refinements are suggested, either to improve the efficiencyor to allow simplified security analysis. 1 I n t r o d u c t i o n Security is a critical issue in mobile radio applications, both for the users and providers of such systems. Although the same may be said of all communica- tions systems, mobile applications have special requirements and vulnerabilities, and are therefore of special concern. Once a call has been set up by establishing various security parameters, the problem is reduced to that of employing appro- priate cryptographic algorithms to provide the required security services. The most important problem is undoubtedly that of designing protocols for authen- tication and key management as part of the call set-up process; security-critical errors made at this stage will undermine the security of the whole of the session, and possibly subsequent sessions as well. The problem of designi

您可能关注的文档

文档评论(0)

bodkd + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档