Telecommunications Science ›› 2016, Vol. 32 ›› Issue (5): 114-120.doi: 10.11959/j.issn.1000-0801.2016144

• research and development • Previous Articles     Next Articles

Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network

Yuehui CHEN1,Miao HUANG2   

  1. 1 Neijiang Vocational and Technical College,Neijiang 641000,China
    2 School of Software,Pingdingshan University,Pingdingshan 467000,China
  • Online:2017-02-22 Published:2017-02-22

Abstract:

In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed.With elliptic curve cryptography and hash functions,random numbers were used to replace public key encryption and time stamp.Firstly,before using the roaming services of a foreign agent(FA),hash function was calculated.A host agent(HA)was used by mobile user to register.Then,authentication and session key were set up with elliptic curve encryption.If HA is always in FA,MU can update the session key with FA.Finally,through a common channel,MU could utilize HA to change their passwords.The analysis of the performance and safety shows that,compared with other similar programs,the proposed scheme has significantly improved efficiency and safety.And the virtual computing time is only 2.000 85 seconds,which sharply reduces the cost of computing.

Key words: mobile network, anonymous security authentication, elliptic curve cryptography, hash function, impersonation attack

No Suggested Reading articles found!