Authentication between communicating parties in a telecommunications network
First Claim
1. Method of authentication between communicating parties in a telecommunications network, wherein a network element and terminal equipment perform authentication of each other and wherein the network element in response to an access message of the terminal equipment allocates a traffic channel on which the traffic is carried out, the method comprising:
- forming in the terminal equipment a pseudo identifier by applying a one-way hash function to content elements comprising a true identifier of the terminal equipment and two random numbers;
sending the pseudo identifier and one of the random numbers in the access message;
forming in the terminal equipment a first partial key;
sending the first partial key to the network element on the traffic channel;
forming in the network element a second partial key;
sending the second partial key and the pseudo identifier to the terminal equipment on the traffic channel;
performing in the terminal equipment authentication of the network element;
forming in the terminal equipment, after successful authentication, a new message containing the true identifier non-encrypted; and
sending to the network element on the traffic channel the new message encrypted with both partial keys.
3 Assignments
0 Petitions
Accused Products
Abstract
In known telecommunications systems using multiple access the terminal equipment assumes that the network element is genuine while the network element assumes that the terminal equipment is genuine. This allows false terminal equipment, a false network element or a third party to penetrate the system. The proposed commitment protocol applies bit block commitment known from cryptography and a shared encryption key and the authentication is divided into two parts, whereby one part of it is done by the terminal equipment and the other part is done by the network. The terminal equipment (MS) sends to the network element (BTS) a pseudo identifier (AMSI) which it has formed, whereupon encryption keys (MKEY, BKEY) are exchanged. Only when the network element has revealed its true identity, will the terminal equipment send the required information (IMSI, RND1, RND2) encrypted with a combination of the keys. Finally, the network element authenticates the terminal equipment by using the identity information which it has revealed. Only then can operation commence.
81 Citations
6 Claims
-
1. Method of authentication between communicating parties in a telecommunications network, wherein a network element and terminal equipment perform authentication of each other and wherein the network element in response to an access message of the terminal equipment allocates a traffic channel on which the traffic is carried out, the method comprising:
-
forming in the terminal equipment a pseudo identifier by applying a one-way hash function to content elements comprising a true identifier of the terminal equipment and two random numbers;
sending the pseudo identifier and one of the random numbers in the access message;
forming in the terminal equipment a first partial key;
sending the first partial key to the network element on the traffic channel;
forming in the network element a second partial key;
sending the second partial key and the pseudo identifier to the terminal equipment on the traffic channel;
performing in the terminal equipment authentication of the network element;
forming in the terminal equipment, after successful authentication, a new message containing the true identifier non-encrypted; and
sending to the network element on the traffic channel the new message encrypted with both partial keys. - View Dependent Claims (2, 3, 4, 5, 6)
applies a hash function to the content elements and compares the result with that pseudo identifier which it has received earlier in the access message, it compares to find out whether the second random number stated in the message is identical to the one which it received earlier in the access message.
-
-
6. Method as defined in claim 5, wherein when comparisons show that the pseudo identifier and the second random number are true, the network element will perform authentication of the terminal equipment.
Specification