Title :
Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system for mobile computing and wireless communication
Author :
Brutch, Tasneem G. ; Brutch, Paul C.
Author_Institution :
Dept. of Comput. Sci., Texas A&M Univ., College Station, TX, USA
Abstract :
In any distributed networked environment, security systems for network access and communication are necessary to allow legitimate hosts on the network to access the network services while denying non-registered hosts. Ideally, such systems should ensure both confidentiality and integrity of messages exchanged over the network. We discuss the deficiencies with the registration and authentication services provided by Global System for Mobile Communication (GSM), Cellular Digital Packet Data (CDPD), and IS-41. Next, we present the design of the Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system to provide a more secure registration and authentication service for mobile computing and wireless communication. The capabilities provided by MACKMAN include registration of legitimate hosts with the network, mutual authentication, and data confidentiality and integrity in a mobile and wireless environment. Data confidentiality and integrity are provided by using the public key Elliptic Curve RSA (ECRSA) cryptosystem in conjunction with a hierarchy of certification authorities for key distribution and management
Keywords :
data integrity; data privacy; message authentication; mobile computing; public key cryptography; telecommunication security; wireless LAN; CDPD; Cellular Digital Packet Data; ECRSA; GSM; Global System for Mobile Communication; IS-41; MACKMAN; certification authorities; cryptosystem; data confidentiality; key distribution; key management; legitimate hosts; message integrity; mobile computing; mutual authentication; network access; network services; public key Elliptic Curve RSA; registration services; wireless communication; Authentication; Communication system security; Elliptic curve cryptography; Elliptic curves; GSM; Mobile communication; Mobile computing; Public key; Public key cryptography; Wireless communication;
Conference_Titel :
Computer Security Applications Conference, 1998. Proceedings. 14th Annual
Conference_Location :
Phoenix, AZ
Print_ISBN :
0-8186-8789-4
DOI :
10.1109/CSAC.1998.738651