CLC number: TN918.1
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 0000-00-00
Cited: 1
Clicked: 6995
JIANG Jun, HE Chen. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications[J]. Journal of Zhejiang University Science A, 2005, 6(5): 399-404.
@article{title="A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications",
author="JIANG Jun, HE Chen",
journal="Journal of Zhejiang University Science A",
volume="6",
number="5",
pages="399-404",
year="2005",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2005.A0399"
}
%0 Journal Article
%T A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
%A JIANG Jun
%A HE Chen
%J Journal of Zhejiang University SCIENCE A
%V 6
%N 5
%P 399-404
%@ 1673-565X
%D 2005
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2005.A0399
TY - JOUR
T1 - A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
A1 - JIANG Jun
A1 - HE Chen
J0 - Journal of Zhejiang University Science A
VL - 6
IS - 5
SP - 399
EP - 404
%@ 1673-565X
Y1 - 2005
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2005.A0399
Abstract: In this paper, the authors present a novel mutual authentication and key agreement protocol based on the number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.
[1] Aydos, M., Sunar, B., Koç, Ç.K., 1998. An Elliptic Curve Cryptography Based Authentication and Key Agreement Protocol for Wireless Communication. 2nd Int. Workshop Discrete Algorithms and Methods for Mobility (DIAL M’98), Dallas, TX.
[2] Beller, M.J., Yacobi, Y., 1993. Fully-fledged two-way public key authentication and key agreement for low-cost terminal. IEE Electronics Letters, 29(11):999-1001.
[3] Hoffstein, J., Silverman, J.H., 2001. NSS: The NTRU signature scheme. Proc. of Eurocrypt ’01, 2045:211-228.
[4] Hoffstein, J., Silverman, J.H., 2002. Optimizations for NTRU. Public-Key Cryptography and Computational Number Theory. DeGruyter. http://www.ntru.com.
[5] Hoffstein, J., Pipher, J., Silverman, J.H., 1998. NTRU: A new high speed public key cryptosystem. Algorithmic Number Theory (ANTS III), 1423:267-288.
[6] Park, C.S., 1995. Session key distribution protocol based on linear algebra for mobile communication network. IEE Electronics Letters, 31(23):1980-1981.
[7] 3GPP TS 21.133 V3.1.0, 3rd Generation Partnership Project, 1999. 3G Security: Security Threats and Requirements.
Open peer comments: Debate/Discuss/Question/Opinion
<1>