Title :
Use Cases of Implicit Authentication and Key Establishment with Sender and Receiver ID Binding
Author_Institution :
Nokia Research Center, dan.forsberg@nokia.com
Abstract :
Common public key based authentication and key establishment (AKE) mechanisms with related Public Key Infrastructures (PKI) are relatively heavy. In this paper we explore public key and identity (ID) based AKE protocols, which do not require certificate authorities. We apply this approach to the symmetric key cryptography by creating a novel and lightweight symmetric key AKE protocol based on sender and/or receiver IDs. To show, how our protocol can be used in places, where common PKI does not perform well we present four new and interesting use cases. One of them is a simple and efficient ISP service user AKE with the help of telecom operator´s Short Message Service (SMS). Our protocol can also be used for wireless network access AKE.
Keywords :
Access protocols; Authentication; Cryptographic protocols; Intrusion detection; Message service; Public key; Public key cryptography; Telecommunications; Wireless application protocol; Wireless networks;
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a
Conference_Location :
Espoo, Finland
Print_ISBN :
978-1-4244-0993-8
Electronic_ISBN :
978-1-4244-0993-8
DOI :
10.1109/WOWMOM.2007.4351769