Full Text:   <3745>

CLC number: TN918.1

On-line Access: 

Received: 2004-05-28

Revision Accepted: 2004-09-01

Crosschecked: 0000-00-00

Cited: 1

Clicked: 6504

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE A 2005 Vol.6 No.5 P.399-404

http://doi.org/10.1631/jzus.2005.A0399


A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications


Author(s):  JIANG Jun, HE Chen

Affiliation(s):  Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030, China

Corresponding email(s):   jiangjunok@sjtu.edu.cn, chenhe@sjtu.edu.cn

Key Words:  Mutual authentication, Number Theory Research Unit (NTRU), Public key cryptography, Wireless communications


JIANG Jun, HE Chen. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications[J]. Journal of Zhejiang University Science A, 2005, 6(5): 399-404.

@article{title="A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications",
author="JIANG Jun, HE Chen",
journal="Journal of Zhejiang University Science A",
volume="6",
number="5",
pages="399-404",
year="2005",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2005.A0399"
}

%0 Journal Article
%T A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
%A JIANG Jun
%A HE Chen
%J Journal of Zhejiang University SCIENCE A
%V 6
%N 5
%P 399-404
%@ 1673-565X
%D 2005
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2005.A0399

TY - JOUR
T1 - A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
A1 - JIANG Jun
A1 - HE Chen
J0 - Journal of Zhejiang University Science A
VL - 6
IS - 5
SP - 399
EP - 404
%@ 1673-565X
Y1 - 2005
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2005.A0399


Abstract: 
In this paper, the authors present a novel mutual authentication and key agreement protocol based on the number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1] Aydos, M., Sunar, B., Koç, Ç.K., 1998. An Elliptic Curve Cryptography Based Authentication and Key Agreement Protocol for Wireless Communication. 2nd Int. Workshop Discrete Algorithms and Methods for Mobility (DIAL M’98), Dallas, TX.

[2] Beller, M.J., Yacobi, Y., 1993. Fully-fledged two-way public key authentication and key agreement for low-cost terminal. IEE Electronics Letters, 29(11):999-1001.

[3] Hoffstein, J., Silverman, J.H., 2001. NSS: The NTRU signature scheme. Proc. of Eurocrypt ’01, 2045:211-228.

[4] Hoffstein, J., Silverman, J.H., 2002. Optimizations for NTRU. Public-Key Cryptography and Computational Number Theory. DeGruyter. http://www.ntru.com.

[5] Hoffstein, J., Pipher, J., Silverman, J.H., 1998. NTRU: A new high speed public key cryptosystem. Algorithmic Number Theory (ANTS III), 1423:267-288.

[6] Park, C.S., 1995. Session key distribution protocol based on linear algebra for mobile communication network. IEE Electronics Letters, 31(23):1980-1981.

[7] 3GPP TS 21.133 V3.1.0, 3rd Generation Partnership Project, 1999. 3G Security: Security Threats and Requirements.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE