Cryptology ePrint Archive: Report 2005/047

Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme

Qiang Tang and Chris J. Mitchell

Abstract: In this paper we analyse an anonymous wireless authentication and conference key distribution scheme which is also designed to provide mobile participants with user identification privacy during the conference call. The proposed scheme consists of three sub-protocols: the Call Set-Up Authentication Protocol, the Hand-Off Authentication Protocol, and the Anonymous Conference Call Protocol. We show that the proposed scheme suffers from a number of security vulnerabilities.

Category / Keywords: cryptographic protocols / wireless authentication, key agreement

Date: received 19 Feb 2005

Contact author: qiang tang at rhul ac uk

Available format(s): PDF | BibTeX Citation

Version: 20050221:142644 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]