
Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
Author(s) -
He Debiao
Publication year - 2012
Publication title -
etri journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.295
H-Index - 46
eISSN - 2233-7326
pISSN - 1225-6463
DOI - 10.4218/etrij.12.0211.0340
Subject(s) - computer science , computer network , key agreement protocol , password , computer security , cryptanalysis , wireless application protocol , wireless , protocol (science) , wireless network , encryption , public key cryptography , telecommunications , key distribution , medicine , alternative medicine , pathology
With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others’ protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure.