Abstract
In this work, we present an authentication protocol derived by the integration of the Kerberos and Lamport authentication schemes. The protocol is targeted to the GSM network, involving users that interact through a mobile phone, and the network provider acting as trusted authority. A prototype application which implements parts of the protocol interaction phases, has been developed in the Javacard framework and is also discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S M Bellovin and M Merritt. Limitations of the kerberos authentication system. Computer Communication Review, 20(5):119–132, 1990.
A. Biryukov, A. Shamir, and D. Wagner. Real-time cryptanalysis of a5/1 gsm on a pc. In Proceedings of the Fast Software Encryption Workshop, New York City, USA, 2000.
J. Daemen and V. Rijmen. The Block Cipher Rijndael. In J.J. Quisquater and B. Schneier, editors, Smart Card Research and Applications, volume 1820 of Lecture Notes in Computer Science, pages 288–296. Springer-Verlag, Berlin, 2000.
Naomaru Itoi, Peter Honeyman, and Ann Arbor. Smartcard integration with kerberos V5. In Proceedings of USENIX Workshop on Smartcard Technology, pages 51–62, Chicago, May 1999.
European Telecommunications Standard Institute. Digital cellular telecommunications system (phase 2+); gsm release 1999 specifications (gsm 01.01), 1999.
European Telecommunications Standard Institute. Digital cellular telecommunications system (phase 2+); specification of the sim application toolkit for the subscriber identity module-mobile equipment interface (gsm 11.14), 1999.
European Telecommunications Standard Institute. Digital cellular telecommunications system (phase 2+); specification of the subscriber identity module-mobile equipment interface (gsm 11.11), 1999.
O. Kornievskaia, P. Honeyman, B. Doster, and K. Coffman. Kerberized credential translation: A solution to web access control. In Proceedings of the 10th USENIX Security Symposium, Washington, D.C., USA, 2001.
Leslie Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770–771, 1981.
Alfred J. Menezes, Paul C. van Ooschot, and Scott A. Vanstone. Handbook of Applied Cryptography. Boca Raton, 1997.
Radicchio Organization. Radicchio: The global initiative for wireless e-commerce. http://www.radicchio.org/info center/faqs radicchio.asp.
Jennifer G. Steiner, B. Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter 1988 Technical Conference, pages 191–202, Berkeley, CA, 1988. USENIX Association.
Sun Microsystems. Java Card 2.1 Application Programming Interface, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cimato, S. (2002). Design of an Authentication Protocol for Gsm Javacards. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_27
Download citation
DOI: https://doi.org/10.1007/3-540-45861-1_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43319-4
Online ISBN: 978-3-540-45861-6
eBook Packages: Springer Book Archive