Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions

被引:3
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] Ewha Womans Univ, Dept Math, Seoul 120750, South Korea
关键词
cryptography; authenticated key agreement; multiple-key agreement protocol; digital signature; unknown key-share attack;
D O I
10.1016/j.csi.2006.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The MQV protocol is the first authenticated key agreement protocol which uses a digital signature to sign Diffie-Hellman public keys without using any one-way hash functions. Based on the MQV protocol, Ham and Lin proposed an authenticated multiple-key agreement protocol that enables two parties to establish multiple common secret keys in a single protocol run. But the protocol was subsequently found to be flawed. Tseng proposed a new generalized MQV key agreement protocol without using one-way hash functions to overcome the weaknesses of Ham-Lin's protocol. Recently, Shao showed that Teng's protocol is insecure against signature forgery attacks and then proposed an improved authenticated multiple-key agreement protocol to resist the attacks. In this paper we show that Shao's protocol is vulnerable to unknown key-share attacks. We also point out its another potential weakness. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:467 / 470
页数:4
相关论文
共 50 条
  • [21] Higher order Universal One-Way Hash Functions
    Hong, DJ
    Preneel, B
    Lee, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 201 - 213
  • [22] A composition theorem for universal one-way hash functions
    Shoup, V
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 445 - 452
  • [23] STRUCTURAL-PROPERTIES OF ONE-WAY HASH FUNCTIONS
    ZHENG, YL
    MATSUMOTO, T
    IMAI, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 285 - 302
  • [24] A watermarking technique based on one-way hash functions
    Hwang, MS
    Chang, CC
    Hwang, KF
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1999, 45 (02) : 286 - 294
  • [25] Secrecy without one-way functions
    Grigoriev, Dima
    Shpilrain, Vladimir
    GROUPS COMPLEXITY CRYPTOLOGY, 2013, 5 (01) : 31 - 52
  • [26] Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 711 - 715
  • [27] Foundations of Non-malleable Hash and One-Way Functions
    Boldyreva, Alexandra
    Cash, David
    Fischlin, Marc
    Warinschi, Bogdan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 524 - +
  • [28] Universal One-Way Hash Functions via Inaccessible Entropy
    Haitner, Iftach
    Holenstein, Thomas
    Reingold, Omer
    Vadhan, Salil
    Wee, Hoeteck
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 616 - 637
  • [29] One-way hash functions based on iterated chaotic systems
    Peng, Fei
    Qiu, Shui-Sheng
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 1070 - +
  • [30] Design of key establishment protocol using one-way functions to avert insider-replay attack
    Saha, Mounita
    RoyChowdhury, Dipanwita
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 194 - +