On the Security of a Key Agreement and Key Protection Scheme

被引:1
|
作者
Han, Yunxia [1 ]
Xu, Chunxiang [1 ,2 ]
He, Debiao [3 ]
Chen, Kefei [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Fujian Prov Univ, Key Lab Financial Math, Putian Univ, Putian 351100, Peoples R China
[3] Wuhan Univ, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[4] Hangzhou Normal Univ, Dept Math, Hangzhou 310027, Peoples R China
关键词
Authentication; Servers; Mobile handsets; Mathematics; Electronic mail; Public key; Cryptoanalysis; authentication; AUTHENTICATION; EFFICIENT;
D O I
10.1109/TIFS.2020.2986881
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We point out that the key agreement and key protection scheme (published in IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2018.2850299) fails to achieve the two-factor security. We demonstrate that in the scheme, if an adversary can control the master device of a target user, he can impersonate the user to pass the server's authentication.
引用
收藏
页码:3293 / 3294
页数:2
相关论文
共 50 条
  • [1] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330
  • [2] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [3] A key agreement scheme for identity authentication based on multiple security factors
    Wang Y.
    Peng X.
    Bian J.
    Int. J. Simul. Syst. Sci. Technol., 3 (13.1-13.7): : 13.1 - 13.7
  • [4] A KEY AGREEMENT SCHEME FOR SATELLITE COMMUNICATIONS
    Lee, Cheng-Chi
    Lin, Tzu-Chun
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2010, 39 (01): : 43 - 47
  • [5] On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    ELECTRONICS, 2024, 13 (16)
  • [6] A KEY AGREEMENT BASED ANONYMITY SCHEME
    Chan, Chao-Wen
    Chin, Te-Chih
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 659 - 663
  • [7] A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments
    Chang, Chin-Chen
    Lin, Iuon-Chang
    Wu, Chia-Chi
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [8] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [9] On the security of HY-key authentication scheme
    Zhan, B
    Li, Z
    Yang, Y
    Hu, Z
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 739 - 741
  • [10] Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
    Xie, Qi
    SCIENTIA IRANICA, 2012, 19 (06) : 1856 - 1860