Cryptology ePrint Archive: Report 2005/047
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
Qiang Tang and Chris J. Mitchell
Abstract: In this paper we analyse an anonymous wireless authentication and
conference key distribution scheme which is also designed to
provide mobile participants with user identification privacy
during the conference call. The proposed scheme consists of three
sub-protocols: the Call Set-Up Authentication Protocol, the
Hand-Off Authentication Protocol, and the Anonymous Conference
Call Protocol. We show that the proposed scheme suffers from a
number of security vulnerabilities.
Category / Keywords: cryptographic protocols / wireless authentication, key agreement
Date: received 19 Feb 2005
Contact author: qiang tang at rhul ac uk
Available formats: PDF | BibTeX Citation
Version: 20050221:142644 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]