Impersonation attack on CertificateLess key agreement protocol

被引:13
作者
Bala, Suman [1 ]
Sharma, Gaurav [2 ]
Verma, Anil K. [3 ]
机构
[1] Amity Univ, Amity Sch Engn & Technol, Noida 201301, India
[2] Amity Univ, Amity Sch Engn, Noida 201301, India
[3] Thapar Univ, Comp Sci & Engn Dept, Patiala 147004, Punjab, India
关键词
CertificateLess cryptography; key agreement; cryptanalysis; CTAKA; CertificateLess two-party authenticated key agreement;
D O I
10.1504/IJAHUC.2018.089580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key agreement is a fundamental activity to establish communication between two parties. Kim et al. (2013) proposed a CertificateLess two-party authenticated key agreement (CTAKA) protocol, which is secure in extended Canetti-Krawczyk (eCK) model. This paper describes the security flaw of Kim et al.'s CTAKA protocol, which is found vulnerable against Key-Compromise Impersonation (K-CI) attack. For the resistance of the attack in Kim et al.'s CTAKA protocol, a defensive measure has been proposed, which is secure in eCK model.
引用
收藏
页码:108 / 120
页数:13
相关论文
共 28 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Amin F., 2008, Int. J. Comput. Inf. Eng, V2, P1448
[3]  
Bala S, 2013, INT J SECUR APPL, V7, P117
[4]  
Cheng Q., 2012, 2012725 CRYPT EPRINT
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]  
Gura N, 2004, LECT NOTES COMPUT SC, V3156, P119
[7]   An efficient certificateless two-party authenticated key agreement protocol [J].
He, Debiao ;
Padhye, Sahadeo ;
Chen, Jianhua .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 64 (06) :1914-1926
[8]   A new two-round certificateless authenticated key agreement protocol without bilinear pairings [J].
He, Debiao ;
Chen, Yitao ;
Chen, Jianhua ;
Zhang, Rui ;
Han, Weiwei .
MATHEMATICAL AND COMPUTER MODELLING, 2011, 54 (11-12) :3143-3152
[9]   A pairing-free certificateless authenticated key agreement protocol [J].
He, Debiao ;
Chen, Jianhua ;
Hu, Jin .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (02) :221-230
[10]   A Two-Party Certificateless Authenticated Key Agreement Protocol without Pairing [J].
Hou, Mengbo ;
Xu, Qiuliang .
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, :412-416