Article ID Journal Published Year Pages File Type
9506615 Applied Mathematics and Computation 2005 13 Pages PDF
Abstract
Mobile electronic commerce has started recently to appear in the scene by exploiting the advantages of mobile computing and telecommunications in order to provide a large number of advanced services to mobile users. A variety of protocols suitable for applications in upcoming third-generation mobile systems such as UMTS have been proposed. In this paper, we identify security flaws with several authentication and key establishment protocols for mobile communications introducing a new kind of attack: known key-share attack. Our results show that the protocols do not provide authentication as intended.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, ,