Skip to main content

Design of an Authentication Protocol for Gsm Javacards

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2001 (ICISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2288))

Included in the following conference series:

Abstract

In this work, we present an authentication protocol derived by the integration of the Kerberos and Lamport authentication schemes. The protocol is targeted to the GSM network, involving users that interact through a mobile phone, and the network provider acting as trusted authority. A prototype application which implements parts of the protocol interaction phases, has been developed in the Javacard framework and is also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S M Bellovin and M Merritt. Limitations of the kerberos authentication system. Computer Communication Review, 20(5):119–132, 1990.

    Article  Google Scholar 

  2. A. Biryukov, A. Shamir, and D. Wagner. Real-time cryptanalysis of a5/1 gsm on a pc. In Proceedings of the Fast Software Encryption Workshop, New York City, USA, 2000.

    Google Scholar 

  3. J. Daemen and V. Rijmen. The Block Cipher Rijndael. In J.J. Quisquater and B. Schneier, editors, Smart Card Research and Applications, volume 1820 of Lecture Notes in Computer Science, pages 288–296. Springer-Verlag, Berlin, 2000.

    Google Scholar 

  4. Naomaru Itoi, Peter Honeyman, and Ann Arbor. Smartcard integration with kerberos V5. In Proceedings of USENIX Workshop on Smartcard Technology, pages 51–62, Chicago, May 1999.

    Google Scholar 

  5. European Telecommunications Standard Institute. Digital cellular telecommunications system (phase 2+); gsm release 1999 specifications (gsm 01.01), 1999.

    Google Scholar 

  6. European Telecommunications Standard Institute. Digital cellular telecommunications system (phase 2+); specification of the sim application toolkit for the subscriber identity module-mobile equipment interface (gsm 11.14), 1999.

    Google Scholar 

  7. European Telecommunications Standard Institute. Digital cellular telecommunications system (phase 2+); specification of the subscriber identity module-mobile equipment interface (gsm 11.11), 1999.

    Google Scholar 

  8. O. Kornievskaia, P. Honeyman, B. Doster, and K. Coffman. Kerberized credential translation: A solution to web access control. In Proceedings of the 10th USENIX Security Symposium, Washington, D.C., USA, 2001.

    Google Scholar 

  9. Leslie Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770–771, 1981.

    Article  MathSciNet  Google Scholar 

  10. Alfred J. Menezes, Paul C. van Ooschot, and Scott A. Vanstone. Handbook of Applied Cryptography. Boca Raton, 1997.

    Google Scholar 

  11. Radicchio Organization. Radicchio: The global initiative for wireless e-commerce. http://www.radicchio.org/info center/faqs radicchio.asp.

  12. Jennifer G. Steiner, B. Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter 1988 Technical Conference, pages 191–202, Berkeley, CA, 1988. USENIX Association.

    Google Scholar 

  13. Sun Microsystems. Java Card 2.1 Application Programming Interface, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cimato, S. (2002). Design of an Authentication Protocol for Gsm Javacards. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_27

Download citation

  • DOI: https://doi.org/10.1007/3-540-45861-1_27

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43319-4

  • Online ISBN: 978-3-540-45861-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics