Benefits of public key authentication mechanisms
- No on-line connection to the home network (i.e., the service provider) is required.
- The user's identity need not be transmitted in plaintext over the air-interface.
- The user is unable to deny that he or she actually used the network.
- It is possible to provide mutual authentication between the user and the visiting network in a dynamically changing environment, without the need to change authentication data in the USIM or the network.
- The public key infrastructure is then available for use in conjunction with other value added services where public key mechanisms are essential, an obvious example being electronic payment.
Demonstrated operational scenario :
User enters a network, Negotiation about the authentication mechanism to be used
InitAuthRqt (SPid, authClass)
PresAuthMech (authMechanism)
Chosen authentication mechanism
RNDN, AUTHN, Enc(Ks,TMUIN), CertN
Enc(Ks,Sigu(h3(Ks||TMUIN))), Enc(Ks,CertU)
Demonstrated authentication mechanism : Siemens protocolUser enters a new network : “new registration”, exchange of certificates
Demonstrated authentication mechanism : Siemens protocolUsers enters a known network : “current registration” , certificates already exchanged
RNDN, AUTHN, Enc(Ks,TMUIN)
Enc(Ks,Sigu(h3(Ks||TMUIN))), Enc(Ks,IMUI)
Fourth Framework Programme
DG XIII B - ACTS Project AC095
Giesecke und Devrient GmbH (D)
Royal Holloway University of London (UK)
Katholieke Universiteit Leuven (B)
Geneviève Vanneste (Genevieve.Vanneste@vnet.atea.be)
WP2.1 : Migration towards UMTS Security
WP2.4 : UIM security functionality
Eric Johnson (Eric.Johnson@gdm.de)