Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions

被引:3
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] Ewha Womans Univ, Dept Math, Seoul 120750, South Korea
关键词
cryptography; authenticated key agreement; multiple-key agreement protocol; digital signature; unknown key-share attack;
D O I
10.1016/j.csi.2006.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The MQV protocol is the first authenticated key agreement protocol which uses a digital signature to sign Diffie-Hellman public keys without using any one-way hash functions. Based on the MQV protocol, Ham and Lin proposed an authenticated multiple-key agreement protocol that enables two parties to establish multiple common secret keys in a single protocol run. But the protocol was subsequently found to be flawed. Tseng proposed a new generalized MQV key agreement protocol without using one-way hash functions to overcome the weaknesses of Ham-Lin's protocol. Recently, Shao showed that Teng's protocol is insecure against signature forgery attacks and then proposed an improved authenticated multiple-key agreement protocol to resist the attacks. In this paper we show that Shao's protocol is vulnerable to unknown key-share attacks. We also point out its another potential weakness. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:467 / 470
页数:4
相关论文
共 50 条
  • [1] Robust generalized MQV key agreement protocol without using one-way hash functions
    Tseng, YM
    COMPUTER STANDARDS & INTERFACES, 2002, 24 (03) : 241 - 246
  • [2] Security of robust generalized MQV key agreement protocol without using one-way hash functions
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (05) : 431 - 436
  • [3] Authenticated key agreement without using one-way hash functions
    Harn, L
    Lin, HY
    ELECTRONICS LETTERS, 2001, 37 (10) : 629 - 630
  • [4] An improved signature scheme without using one-way Hash functions
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 905 - 908
  • [5] A digital signature schemes without using one-way hash and message redundancy and its application on key agreement
    Zhang, Hua
    Yuan, Zheng
    Wen, Qiao-yan
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 873 - +
  • [6] ONE-WAY HASH FUNCTIONS
    SCHNEIER, B
    DR DOBBS JOURNAL, 1991, 16 (09): : 148 - 150
  • [7] A constant rounds group key agreement protocol without using hash functions
    Zhang, Hua
    Wen, Qiao-yan
    Zhang, Jie
    Li, Wen-min
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2009, 19 (06) : 457 - 464
  • [8] Enhancement of an authenticated multiple-key agreement protocol without using conventional one-way function
    Huang, HF
    Chang, CC
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 554 - 559
  • [9] Improved authenticated multiple-key agreement protocol without using conventional one-way function
    Chien, HY
    Jan, JK
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 147 (02) : 491 - 497
  • [10] Provably secure key establishment protocol using one-way functions
    Saha, Mounita
    RoyChowdhury, Dipanwita
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2009, 12 (02): : 139 - 158