Application of ESA in the CAVE Mode Authentication
This paper proposes the authentication method using
ESA algorithm instead of using CAVE algorithm in the CDMA
mobile communication systems including IS-95 and CDMA2000 1x.
And, we analyze to apply ESA mechanism on behalf of CAVE
mechanism without the change of message format and air interface in
the existing CDMA systems. If ESA algorithm can be used as the
substitution of CAVE algorithm, security strength of authentication
algorithm is intensified without protocol change. An algorithm
replacement proposed in this paper is not to change an authentication
mechanism, but to configure input of ESA algorithm and to produce
output. Therefore, our proposal can be the compatible to the existing
systems.
[1] 3GPP2 S.S0053, "Common Cryptographic Algorithms", 2002.
[2] 3GPP2 S.S0055, "Enhanced Cryptographic Algorithms", 2005.
[3] 3GPP2 S.S0078, "Common Security Algorithms", 2005.
[4] 3GPP2 S.S0054, "Interface Specification for Common Cryptographic
Algorithms", 2002.
[5] 3GPP2 S.R0032, "ESA and ESP", 2000.
[6] 3GPP2 N.S0014, "Authentication Enhancements", 2000.
[7] TIA-95-B, "Mobile Station-Base Station Compatibility Standard for
Wideband Spectrum Cellular System", 2004.
[8] FIPS 180-2, "Secure Hash Standard", NIST, 2002.
[9] 3GPP TS 33.102, "Security Architecture", 2004
[10] Vijay K. Grag, "IS-95 CDMA and CDMA2000", Prentice Hall, 2000
[11] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, "Chapter 9: Hash
Functions and Data Integrity", HandBook of Applied Cryptography, CRC
Press, pp. 321-383, 1997.
[12] W. Millan and P. Gauravaram, "cryptanalysis of the cellular
authentication and voice encryption algorithm," IEICE Electronics
Express, Vol. 1, No. 15, pp.453-459, 2004..
[13] P. Gauravaram and W. Millan, "Improved Attack on the Cellular
Authentication and Voice Encryption Algorithm," Proc. International
workshop on Cryptographic Algorithms and their Uses, pp. 1-13, 2004.
[1] 3GPP2 S.S0053, "Common Cryptographic Algorithms", 2002.
[2] 3GPP2 S.S0055, "Enhanced Cryptographic Algorithms", 2005.
[3] 3GPP2 S.S0078, "Common Security Algorithms", 2005.
[4] 3GPP2 S.S0054, "Interface Specification for Common Cryptographic
Algorithms", 2002.
[5] 3GPP2 S.R0032, "ESA and ESP", 2000.
[6] 3GPP2 N.S0014, "Authentication Enhancements", 2000.
[7] TIA-95-B, "Mobile Station-Base Station Compatibility Standard for
Wideband Spectrum Cellular System", 2004.
[8] FIPS 180-2, "Secure Hash Standard", NIST, 2002.
[9] 3GPP TS 33.102, "Security Architecture", 2004
[10] Vijay K. Grag, "IS-95 CDMA and CDMA2000", Prentice Hall, 2000
[11] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, "Chapter 9: Hash
Functions and Data Integrity", HandBook of Applied Cryptography, CRC
Press, pp. 321-383, 1997.
[12] W. Millan and P. Gauravaram, "cryptanalysis of the cellular
authentication and voice encryption algorithm," IEICE Electronics
Express, Vol. 1, No. 15, pp.453-459, 2004..
[13] P. Gauravaram and W. Millan, "Improved Attack on the Cellular
Authentication and Voice Encryption Algorithm," Proc. International
workshop on Cryptographic Algorithms and their Uses, pp. 1-13, 2004.
@article{"International Journal of Electrical, Electronic and Communication Sciences:52367", author = "Keonwoo Kim and Dowon Hong and Kyoil Chung", title = "Application of ESA in the CAVE Mode Authentication", abstract = "This paper proposes the authentication method using
ESA algorithm instead of using CAVE algorithm in the CDMA
mobile communication systems including IS-95 and CDMA2000 1x.
And, we analyze to apply ESA mechanism on behalf of CAVE
mechanism without the change of message format and air interface in
the existing CDMA systems. If ESA algorithm can be used as the
substitution of CAVE algorithm, security strength of authentication
algorithm is intensified without protocol change. An algorithm
replacement proposed in this paper is not to change an authentication
mechanism, but to configure input of ESA algorithm and to produce
output. Therefore, our proposal can be the compatible to the existing
systems.", keywords = "ESA, CAVE, CDMA, authentication, mobilecommunication.", volume = "2", number = "6", pages = "1087-5", }