Mitchell, C. J. (2000) Making serial number based authentication robust against loss of state. ACM Operating Systems Review, 34 (3).
Full text access: Open
In this paper a novel method for making serial number based authentication protocols resilient against database failure is described. The method is applicable to the situation where a single server wishes to authenticate itself to a number of clients, but cannot reliably maintain a sequence number database. The solution has recently been included in a draft international standard for third generation mobile telecommunications, [1].
This is a Published version This version's date is: 07/2000 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/1aa15ead-4694-39cf-022e-023781426237/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 23-Dec-2009
This is the final draft version of the paper that appeared in 'ACM Operating Systems Review', 34(3), 2000.
1 3rd Generation Partnership Project (3GPP). 3G TS 33.102 version 3.0.0 --- Technical Specification Group Services and System Aspects; 3G Security; Security Architecture, May 1999. 2 International Organization for Standardization, Genève, Switzerland. ISO/IEC 9798-1: 1997, Information Technology --- Security techniques --- Entity authentication --- Part 1: General, Second edition, August 1997. 3 Leslie Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, v.21 n.7, p.558-565, July 1978 [doi>10.1145/359545.359563] 4 Klaus Vedder, Security Aspects of Mobile Communications, Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, p.193-210, May 21-23, 1991