Security weaknesses of authenticated key agreement protocols

被引:19
|
作者
Nose, Peter [1 ,2 ]
机构
[1] Inst Math Phys & Mech, Ljubljana, Slovenia
[2] Univ Ljubljana, FRI, Ljubljana, Slovenia
关键词
Cryptography; Authentication; Key agreement; Key exchange; Two-party; Three-party; Tripartite; Bilinear pairing; EFFICIENT;
D O I
10.1016/j.ipl.2011.04.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of Holbl et al. After the analysis, we found that Tan et al.'s, Lim et al.'s and two protocols of Holbl et al. are insecure against the impersonation attack and the man-in-the-middle attack, Chen et al.'s protocol cannot withstand the key-compromise impersonation attack, one protocol of Holbl et al. is vulnerable to the insider attack, one allows an adversary to compute the private key of any user and one protocol allows her to compute the shared secret key. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:687 / 696
页数:10
相关论文
共 50 条
  • [1] Security weaknesses of a signature scheme and authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 107 - 115
  • [2] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [3] Potential weaknesses of AuthA password-authenticated key agreement protocols
    Shim, Kyung-Ah
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 580 - 583
  • [4] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [5] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [6] Security properties of two authenticated conference key agreement protocols
    Tang, Q
    Mitchell, CJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 304 - 314
  • [7] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [8] Provably secure anonymous authenticated key agreement protocols with enhanced security models
    Xie, Qi
    Tan, Xiao
    Hu, Bin
    Wang, Guilin
    Wong, Duncan S.
    Chen, Kefei
    Yu, XiuYuan
    SCIENCE, 2018, 360 (6387) : 27 - 28
  • [9] Enhancing the security of password authenticated key agreement protocols based on chaotic maps
    Lee, Tian-Fu
    INFORMATION SCIENCES, 2015, 290 : 63 - 71
  • [10] WEAKNESSES IN SOME RECENT KEY AGREEMENT PROTOCOLS
    NYBERG, K
    RUEPPEL, RA
    ELECTRONICS LETTERS, 1994, 30 (01) : 26 - 27