Font Size: a A A

Design And Implementation Of Mutual Authentication Key Agreement Scheme Based On WAP

Posted on:2011-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhengFull Text:PDF
GTID:2178360305461921Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the communication network technology, a large quantity of sensitive information is disseminated across the network, which has been drawing increasing attention to the issues of information security. The authentication technology is critical in information security theory and technology, and the identity authentication is the first protection for security system where its vital importance is demonstrated.WAP, of which the security functionality is realized through the WTLS protocol, plays an essential role in the security of WAP mobile service. At present, WAP employs the certificate-based public key cryptosystem to solve related security issues. However, due to the unnegligible differences between wireless environment and conventional lineate environment, many security systems in lineate environment are not suitable for wireless environment. It is imperative to develop a kind of identity authentication system fit for wireless environment.Firstly, we introduce the cryptology knowledge relevant to the thesis and then systematically explore the WTLS protocol stack. Some security vulnerabilities in WTLS handshake protocol were indicated based on detailed analyses made on handshake protocol of WTLS protocol stack. At last, after analyzing the existent research all over the world, a scheme of mutual authentication and key exchange for WAP without using digital certificates is proposed. Compared with the existing protocols of various kinds, the project has the following advantages:(1) Bloom filter technology is introduced into the identity authentication instead of digital certificates to confirm the validity of the public key, which reduces the certificate confirmation operation and save the computing time.(2) Mobile users need only to save the filter data of corresponding AP without further preserving the identity of AP, which largely saves the storage of ME.(3) Based on elliptic curve over finite field F2m, the project has the following advantages:the shorter key length and the higher efficiency, which are suitable for wireless environment.We make a detailed analysis of the performance and security about the proposed scheme and have confirmed its feasibility under the Myeclipse platform. Therefore, the proposed scheme can effectively reduce the key length, the complexity of computation and the cost of transmission, thus improve the authentication efficiency, which validates the suitability of the scheme for wireless environment.
Keywords/Search Tags:WAP, bloom filter, mutual authentication, elliptic curve cryptosystem, public-key
PDF Full Text Request
Related items