Making serial number based authentication robust against loss of state

Mitchell, C. J.

(2000)

Mitchell, C. J. (2000) Making serial number based authentication robust against loss of state. ACM Operating Systems Review, 34 (3).

Our Full Text Deposits

Full text access: Open

Full Text - 101.32 KB

Full Text - 50.59 KB

Links to Copies of this Item Held Elsewhere


Abstract

In this paper a novel method for making serial number based authentication protocols resilient against database failure is described. The method is applicable to the situation where a single server wishes to authenticate itself to a number of clients, but cannot reliably maintain a sequence number database. The solution has recently been included in a draft international standard for third generation mobile telecommunications, [1].

Information about this Version

This is a Published version
This version's date is: 07/2000
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/1aa15ead-4694-39cf-022e-023781426237/1/

Item TypeJournal Article
TitleMaking serial number based authentication robust against loss of state
AuthorsMitchell, C. J.
Uncontrolled Keywordsserial number, authentication, database, mobile telecommunications
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1145/506117.506124

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 23-Dec-2009

Notes

This is the final draft version of the paper that appeared in 'ACM Operating Systems Review', 34(3), 2000.

References

1 3rd Generation Partnership Project (3GPP). 3G TS 33.102 version 3.0.0 --- Technical Specification Group Services and System Aspects; 3G Security; Security Architecture, May 1999.
2 International Organization for Standardization, Genève, Switzerland. ISO/IEC 9798-1: 1997, Information Technology --- Security techniques --- Entity authentication --- Part 1: General, Second edition, August 1997.
3 Leslie Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, v.21 n.7, p.558-565, July 1978 [doi>10.1145/359545.359563]
4 Klaus Vedder, Security Aspects of Mobile Communications, Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, p.193-210, May 21-23, 1991


Details