Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity

被引:2
|
作者
Jo, Hyang-Rim [1 ]
Pak, Kyong-Sok [1 ]
Kim, Chung-Hyok [1 ]
Zhang, Il-Jin [1 ]
机构
[1] Kim Il Sung Univ, Fac Informat Sci, Pyongyang, North Korea
来源
PLOS ONE | 2022年 / 17卷 / 07期
关键词
USER AUTHENTICATION; EXCHANGE PROTOCOL; FUZZY EXTRACTORS; SCHEME; BIOMETRICS; EFFICIENT; ANONYMITY; SECURITY;
D O I
10.1371/journal.pone.0271817
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is one of the important security requirements to enhance the security performance of key agreement. Recently Zhou et al. had proposed the key agreement protocol using pseudo-identifiers, but we found that there were weaknesses in their protocol. We have demonstrated that Zhou et al.'s protocol is vulnerable to replay attack, fails to provide mutual authentication, no key control, re-registration with the original identifier and efficiency in the verification of wrong password. We improved their scheme and proposed an improved authentication key agreement protocol that provides robust mutual authentication and the secure session key agreement. We analyzed its security performance using BAN logic and AVISPA tools and compared computational cost, communication overhead and security properties with other related schemes.
引用
收藏
页数:38
相关论文
共 50 条
  • [1] An efficient protocol for mutual authentication and key agreement using the subscriber identity module
    Lee, MK
    Hong, DW
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 408 - 413
  • [2] Cryptanalysis of the mutual authentication and key agreement protocol with smart cards for wireless communications
    Chiou, Shu-Fen
    Pan, Hsieh-Tsen
    Cahyadi, Eko Fajar
    Hwang, Min-Shiang
    International Journal of Network Security, 2019, 21 (01) : 100 - 104
  • [3] Cryptanalysis and Improvement of An 'Efficient Remote Mutual Authentication and Key Agreement'
    Wang, Jian
    Wang, Haihang
    Tan, Chengxiang
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 835 - 840
  • [4] Cryptanalysis of the improved authenticated key agreement protocol
    Chang, TY
    Yang, CC
    Yang, YW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 771 - 774
  • [5] Improved Adaptive Protocol for Authentication and Key Agreement
    Shalmany, Nasibeh Alijanpour
    Rahbar, Akbar Ghaffar Pour
    2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 1 - 6
  • [6] Improved quantum key agreement protocol with authentication
    郭继红
    柏明强
    雷小燕
    谢佳欣
    莫智文
    ChinesePhysicsB, 2023, 32 (05) : 356 - 361
  • [7] Improved quantum key agreement protocol with authentication
    Guo, Ji-Hong
    Bai, Ming-Qiang
    Lei, Xiao-Yan
    Xie, Jia-Xin
    Mo, Zhi-Wen
    CHINESE PHYSICS B, 2023, 32 (05)
  • [8] A key agreement protocol using mutual authentication for ad-hoc networks
    Lo, CC
    Huang, CC
    Huang, YX
    2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 814 - 818
  • [9] Identity (ID)-based authentication and the key agreement protocol
    School of Electronics and Information Engineering, Beijing Jiaotong Univ., Beijing 100044, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2008, 3 (559-562):
  • [10] A New Mutual Authentication and Key Agreement Protocol for Mobile Communications
    Zhang, Juan
    Chen, Guang-hui
    Deng, Fang-min
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9096 - +