Impersontion Attack on Mutual Authentication and Key Establishment Protocol for Communication Networks

Hong‐Yi Fan
2007-01-01
Abstract:In a wireless mobile communication system,users and network servers need to authenticate one another and agreement on a session key used for encryption purposes in their conversation.This paper provides security analysis of a mutual authentication and key establishment protocol for wireless communication based on elliptic curve cryptography.Unfortunately proposed by Fangmin Deng et al.,then pointed out that their protocol does not achieve some essential security requirement including forward secrecy,impersonation attack and man-in-middle attack.
What problem does this paper attempt to address?