On the Security of a Key Agreement and Key Protection Scheme

被引:1
作者
Han, Yunxia [1 ]
Xu, Chunxiang [1 ,2 ]
He, Debiao [3 ]
Chen, Kefei [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Fujian Prov Univ, Key Lab Financial Math, Putian Univ, Putian 351100, Peoples R China
[3] Wuhan Univ, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[4] Hangzhou Normal Univ, Dept Math, Hangzhou 310027, Peoples R China
关键词
Authentication; Servers; Mobile handsets; Mathematics; Electronic mail; Public key; Cryptoanalysis; authentication; AUTHENTICATION; EFFICIENT;
D O I
10.1109/TIFS.2020.2986881
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We point out that the key agreement and key protection scheme (published in IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2018.2850299) fails to achieve the two-factor security. We demonstrate that in the scheme, if an adversary can control the master device of a target user, he can impersonate the user to pass the server's authentication.
引用
收藏
页码:3293 / 3294
页数:2
相关论文
共 50 条
  • [41] Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme
    Kumari, Shipra
    Om, Hari
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 2513 - 2537
  • [42] A Secure Biometrics and PUFs-Based Authentication Scheme With Key Agreement For Multi-Server Environments
    Zhao, Jun
    Bian, Weixin
    Xu, Deqin
    Jie, Biao
    Ding, Xintao
    Zhou, Wen
    Zhang, Hui
    IEEE ACCESS, 2020, 8 : 45292 - 45303
  • [43] GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications
    Nakkar, Mouna
    AlTawy, Riham
    Youssef, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 840 - 854
  • [44] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [45] LBRAKA: Lattice-Based Robust Authenticated Key Agreement for VANETs
    Liu, Gao
    Li, Weiyang
    Yuan, Chengsheng
    Wang, Ning
    Ma, Chuan
    Mu, Nankun
    Liu, Zhiquan
    Liu, Yining
    Xiang, Tao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (04) : 6533 - 6547
  • [46] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision (vol 19, pg 1227, 2022)
    Cao, Zhengjun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4304 - 4305
  • [47] A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT
    Ming, Yang
    Yang, Pengfei
    Mahdikhani, Hassan
    Lu, Rongxing
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2225 - 2236
  • [48] Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme
    Lin, Han-Yu
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 78 (02) : 1487 - 1494
  • [49] On the security of an efficient two-pass key agreement protocol
    Tseng, YM
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (04) : 371 - 374
  • [50] Security analysis of an authentication and key agreement protocol for satellite communications
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 4300 - 4306