Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol

被引:19
作者
Wang, Shengbao [1 ]
Cao, Zhenfu [1 ]
Strangio, Maurizio Adriano [2 ]
Wang, Lihua [3 ]
机构
[1] Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
[2] Univ Rome, Dept Math, Rome, Italy
[3] Natl Inst Informat & Commun Technol, Informat Secur Res Ctr, Tokyo, Japan
基金
中国国家自然科学基金;
关键词
key agreement; elliptic curve cryptography; Diffie-Hellman protocol; key-compromise impersonation; MQV;
D O I
10.1109/LCOMM.2008.071307
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In SAC'05, Strangio proposed protocol ECKE1 as an efficient, elliptic curve Diffie-Hellman two-party key, agreement protocol using public key authentication. In this letter, we show that protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We also present an improved protocol - ECKE-1N, which can withstand such attacks. The new protocol's performance is comparable to the well-known MQV protocol and maintains the same remarkable list of security properties.
引用
收藏
页码:149 / 151
页数:3
相关论文
共 50 条
[21]   Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol [J].
Zia Bashir ;
M. G. Abbas Malik ;
Muhammad Hussain ;
Nadeem Iqbal .
Multimedia Tools and Applications, 2022, 81 :3867-3897
[22]   NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM [J].
Koziel, Brian ;
Jalali, Amir ;
Azarderakhsh, Reza ;
Jao, David ;
Mozaffari-Kermani, Mehran .
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 :88-103
[23]   The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms [J].
Maurer, UM ;
Wolf, S .
SIAM JOURNAL ON COMPUTING, 1999, 28 (05) :1689-1721
[24]   Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol [J].
Bashir, Zia ;
Malik, M. G. Abbas ;
Hussain, Muhammad ;
Iqbal, Nadeem .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (03) :3867-3897
[25]   Using the Modified Diffie-Hellman Problem to Enhance Client Computational Performance in a Three-Party Authenticated Key Agreement [J].
Chien, Hung-Yu .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :637-644
[26]   Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM [J].
Jalali, Amir ;
Azarderakhsh, Reza ;
Kermani, Mehran Mozaffari ;
Jao, David .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (05) :902-912
[27]   Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable [J].
Nakagawa, Kohei ;
Fujioka, Atsushi ;
Nagai, Akira ;
Tomida, Junichi ;
Xagawa, Keita ;
Yasuda, Kan .
PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 :171-191
[28]   Diffie-Hellman Key Distribution in Wireless Multi-Way Relay Networks [J].
Chang, Ronald Y. ;
Lin, Sian-Jheng ;
Chung, Wei-Ho .
2013 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2013,
[29]   Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA [J].
Koziel, Brian ;
Azarderakhsh, Reza ;
Mozaffari-Kermani, Mehran .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 :191-206
[30]   Security and efficiency trade-offs for elliptic curve Diffie-Hellman at the 128-bit and 224-bit security levels [J].
Nath, Kaushik ;
Sarkar, Palash .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (01) :107-121