| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 9506615 | Applied Mathematics and Computation | 2005 | 13 Pages |
Abstract
Mobile electronic commerce has started recently to appear in the scene by exploiting the advantages of mobile computing and telecommunications in order to provide a large number of advanced services to mobile users. A variety of protocols suitable for applications in upcoming third-generation mobile systems such as UMTS have been proposed. In this paper, we identify security flaws with several authentication and key establishment protocols for mobile communications introducing a new kind of attack: known key-share attack. Our results show that the protocols do not provide authentication as intended.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Kyungah Shim, Young-Ran Lee,
