Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm. / Mayes, Keith; Babbage, Steve; Maximov, Alexander.

In: International Journal on Advances in Security, Vol. 9, No. 3&4, 31.12.2016, p. 158-168.

Research output: Contribution to journalArticlepeer-review

Published

Standard

Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm. / Mayes, Keith; Babbage, Steve; Maximov, Alexander.

In: International Journal on Advances in Security, Vol. 9, No. 3&4, 31.12.2016, p. 158-168.

Research output: Contribution to journalArticlepeer-review

Harvard

Mayes, K, Babbage, S & Maximov, A 2016, 'Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm', International Journal on Advances in Security, vol. 9, no. 3&4, pp. 158-168. <http://www.iariajournals.org/security/sec_v9_n34_2016_paged.pdf>

APA

Mayes, K., Babbage, S., & Maximov, A. (2016). Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm. International Journal on Advances in Security, 9(3&4), 158-168. http://www.iariajournals.org/security/sec_v9_n34_2016_paged.pdf

Vancouver

Mayes K, Babbage S, Maximov A. Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm. International Journal on Advances in Security. 2016 Dec 31;9(3&4):158-168.

Author

Mayes, Keith ; Babbage, Steve ; Maximov, Alexander. / Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm. In: International Journal on Advances in Security. 2016 ; Vol. 9, No. 3&4. pp. 158-168.

BibTeX

@article{97526786addf4c6f8c102252503997af,
title = "Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm",
abstract = "Support for secure mobile authentication in long-term Machine-to-Machine (M2M) deployments, in which the network operator may change, requires the use of common authentication algorithms. The existing 3G MILENAGE algorithm is suitable for this, however there is need for a back-up/alternative in case vulnerabilities are discovered. TUAK is a new mutual authentication and key generation algorithm proposed by the Security Algorithm Group of Experts (SAGE) of the European Telecommunications Standards Institute (ETSI) and published by the Third Generation Partnership Project (3GPP). TUAK is based on the Keccak sponge function, which has very different design principles to MILENAGE. However, the practicality of implementing TUAK on currently deployed and/or future Subscriber Identity Module (SIM) cards was not well known. This paper extends on work first published in ICONS16/EMBEDDED2016; describing the implementation and performance of TUAK on three smart card platforms and a server.",
keywords = "3GPP, GSM, Keccak, SAGE, TUAK",
author = "Keith Mayes and Steve Babbage and Alexander Maximov",
year = "2016",
month = dec,
day = "31",
language = "English",
volume = "9",
pages = "158--168",
journal = "International Journal on Advances in Security",
issn = "1942-2636",
number = "3&4",

}

RIS

TY - JOUR

T1 - Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm

AU - Mayes, Keith

AU - Babbage, Steve

AU - Maximov, Alexander

PY - 2016/12/31

Y1 - 2016/12/31

N2 - Support for secure mobile authentication in long-term Machine-to-Machine (M2M) deployments, in which the network operator may change, requires the use of common authentication algorithms. The existing 3G MILENAGE algorithm is suitable for this, however there is need for a back-up/alternative in case vulnerabilities are discovered. TUAK is a new mutual authentication and key generation algorithm proposed by the Security Algorithm Group of Experts (SAGE) of the European Telecommunications Standards Institute (ETSI) and published by the Third Generation Partnership Project (3GPP). TUAK is based on the Keccak sponge function, which has very different design principles to MILENAGE. However, the practicality of implementing TUAK on currently deployed and/or future Subscriber Identity Module (SIM) cards was not well known. This paper extends on work first published in ICONS16/EMBEDDED2016; describing the implementation and performance of TUAK on three smart card platforms and a server.

AB - Support for secure mobile authentication in long-term Machine-to-Machine (M2M) deployments, in which the network operator may change, requires the use of common authentication algorithms. The existing 3G MILENAGE algorithm is suitable for this, however there is need for a back-up/alternative in case vulnerabilities are discovered. TUAK is a new mutual authentication and key generation algorithm proposed by the Security Algorithm Group of Experts (SAGE) of the European Telecommunications Standards Institute (ETSI) and published by the Third Generation Partnership Project (3GPP). TUAK is based on the Keccak sponge function, which has very different design principles to MILENAGE. However, the practicality of implementing TUAK on currently deployed and/or future Subscriber Identity Module (SIM) cards was not well known. This paper extends on work first published in ICONS16/EMBEDDED2016; describing the implementation and performance of TUAK on three smart card platforms and a server.

KW - 3GPP

KW - GSM

KW - Keccak

KW - SAGE

KW - TUAK

M3 - Article

VL - 9

SP - 158

EP - 168

JO - International Journal on Advances in Security

JF - International Journal on Advances in Security

SN - 1942-2636

IS - 3&4

ER -