Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31584
Application of ESA in the CAVE Mode Authentication

Authors: Keonwoo Kim, Dowon Hong, Kyoil Chung

Abstract:

This paper proposes the authentication method using ESA algorithm instead of using CAVE algorithm in the CDMA mobile communication systems including IS-95 and CDMA2000 1x. And, we analyze to apply ESA mechanism on behalf of CAVE mechanism without the change of message format and air interface in the existing CDMA systems. If ESA algorithm can be used as the substitution of CAVE algorithm, security strength of authentication algorithm is intensified without protocol change. An algorithm replacement proposed in this paper is not to change an authentication mechanism, but to configure input of ESA algorithm and to produce output. Therefore, our proposal can be the compatible to the existing systems.

Keywords: ESA, CAVE, CDMA, authentication, mobilecommunication.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1058773

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1342

References:


[1] 3GPP2 S.S0053, "Common Cryptographic Algorithms", 2002.
[2] 3GPP2 S.S0055, "Enhanced Cryptographic Algorithms", 2005.
[3] 3GPP2 S.S0078, "Common Security Algorithms", 2005.
[4] 3GPP2 S.S0054, "Interface Specification for Common Cryptographic Algorithms", 2002.
[5] 3GPP2 S.R0032, "ESA and ESP", 2000.
[6] 3GPP2 N.S0014, "Authentication Enhancements", 2000.
[7] TIA-95-B, "Mobile Station-Base Station Compatibility Standard for Wideband Spectrum Cellular System", 2004.
[8] FIPS 180-2, "Secure Hash Standard", NIST, 2002.
[9] 3GPP TS 33.102, "Security Architecture", 2004
[10] Vijay K. Grag, "IS-95 CDMA and CDMA2000", Prentice Hall, 2000
[11] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, "Chapter 9: Hash Functions and Data Integrity", HandBook of Applied Cryptography, CRC Press, pp. 321-383, 1997.
[12] W. Millan and P. Gauravaram, "cryptanalysis of the cellular authentication and voice encryption algorithm," IEICE Electronics Express, Vol. 1, No. 15, pp.453-459, 2004..
[13] P. Gauravaram and W. Millan, "Improved Attack on the Cellular Authentication and Voice Encryption Algorithm," Proc. International workshop on Cryptographic Algorithms and their Uses, pp. 1-13, 2004.