JOURNAL ARTICLE

Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication

Yongbin ZhouZhenfeng ZhangDengguo Feng

Year: 2005 Journal:   IEEE Communications Letters Vol: 9 (4)Pages: 372-374   Publisher: IEEE Communications Society

Abstract

This letter shows that the end-to-end security protocol for mobile communications with end-user identification/authentication due to Chang et al., (2004) has a serious security flaw. We demonstrate this by presenting a simple but powerful impersonation attack against the protocol so that the protocol is insecure against impersonation attack. Hence, the protocol cannot achieve the claimed security. To overcome such a security flaw, a modification is presented.

Keywords:
Computer science Authentication protocol Otway–Rees protocol Computer network Computer security End-to-end principle Cryptanalysis Protocol (science) Challenge-Handshake Authentication Protocol Authentication (law) Wide Mouth Frog protocol Reflection attack Simple (philosophy) End user Cryptography World Wide Web

Metrics

3
Cited By
0.53
FWCI (Field Weighted Citation Impact)
3
Refs
0.73
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication

Chin‐Chen ChangKuo-Lun ChenMin‐Shiang Hwang

Journal:   Wireless Personal Communications Year: 2004 Vol: 28 (2)Pages: 95-106
BOOK-CHAPTER

Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications

Reiner DojenVladimir PaşcaTom Coffey

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2009 Pages: 278-287
JOURNAL ARTICLE

End-to-end communications security

Kevin J. Kumpf

Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Year: 2006 Vol: 6241 Pages: 62410R-62410R
JOURNAL ARTICLE

A new privacy and authentication protocol for end‐to‐end mobile users

Cheng‐Chi LeeChao‐Chen YangMin‐Shiang Hwang

Journal:   International Journal of Communication Systems Year: 2003 Vol: 16 (9)Pages: 799-808
© 2026 ScienceGate Book Chapters — All rights reserved.