Advertisement

Is Entity Authentication Necessary?

  • Chris J. Mitchell
  • Paulo S. Pagliusi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2845)

Abstract

Conventionally, mutual entity authentication is seen as the necessary precursor to the establishment of a secure connection. However, there exist examples of cases where authentication is not needed. The purpose of this paper is to consider this proposition, illustrated by case studies, and to use the findings of this investigation as input for the design of authentication protocols suitable for use in future Internet access environments supporting ubiquitous mobility.

Keywords

Mobile User Authentication Protocol Home Network Message Authentication Code Entity Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  2. 2.
    Walker, M., Wright, T.: Security. In: Hillebrand, F. (ed.) GSM and UMTS: The creation of global mobile communication, pp. 385–406. John Wiley & Sons, Chichester (2002)Google Scholar
  3. 3.
    Sutton, R.: Secure communications: Applications and management. John Wiley & Sons, Chichester (2002)Google Scholar
  4. 4.
    Mitchell, C.: The security of the GSM air interface protocol. Technical Report RHUL-MA-2001-3, Mathematics Department, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK (2001), Available at http://www.ma.rhul.ac.uk/techreports
  5. 5.
    Third Generation Partnership Project: 3GPP TS 33.102: Security Architecture. V3.11.0 edn, Technical Specification Group Services and System Aspects, 3G Security, Valbonne, France (2002)Google Scholar
  6. 6.
    Mitchell, C.: Making serial number based authentication robust against loss of state. ACM Operating Systems Review 34, 56–59 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Chris J. Mitchell
    • 1
  • Paulo S. Pagliusi
    • 1
  1. 1.Information Security GroupRoyal Holloway, University of LondonEgham, SurreyUK

Personalised recommendations