On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol
نویسنده
چکیده
In ICCSA 2005, Lee, Kim, Kim, & Oh proposed a new (two-party) ID-based key agreement protocol, which they claimed to provide known key security resilience, forward secrecy, key compromise resilience, unknown key share resilience, and key control, however, without providing any security proofs. In this work, we demonstrate that their claims of known key security resilience and key control are flawed by revealing previously unpublished flaw in the two-party ID-based key agreement protocol. We may speculate that such (trivial) errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security. We conclude with a countermeasure due to Choo, Boyd, & Hitchcock (2005).
منابع مشابه
Do Endometrial Movements Affect The Achievement of Pregnancy during Intrauterine Insemination?
متن کامل
Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol
In recent issue of Journal of Applied Mathematics and Computation (2005), Lee, Kim, & Yoo revealed an attack on Hsu, Wu, & Wu (2003) authenticated key agreement protocol, and then presented an improved protocol. However, Lee, Kim, & Yoo (2005) present only heuristic argument with no formal proof of security. In this work, we revealed previously unpublished flaw in the protocol. We may speculate...
متن کاملIdentity-Based Key Agreement Protocols in a Multiple PKG Environment
To date, most identity-based key agreement protocols are based on a single PKG (Private Key Generator) environment. In 2002, Chen and Kudla proposed an identity-based key agreement protocol for a multiple PKG environment, where each PKG shares identical system parameters but possesses a distinct master key. However, it is more realistic to assume that each PKG uses different system parameters. ...
متن کاملOff-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication
In 2004, Kim, Huh, Hwang and Lee proposed an efficient key agreement protocol for secure authentication. In this paper, we shall show that their proposed protocol cannot resist the off-line password guessing attack and therefore present a modified protocol to avoid this attack.
متن کاملA New Authenticated Key Agreement Protocol
Authenticated key agreement protocols play a significant role in securing communications over public network channels (Internet). This paper proposes a new key agreement protocol based on factorization problem over nonabelian groups. Then it presents two different ways to provide mutual authentication for the proposed protocol; this paper presents a new authenticated key agreement protocol usin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 3 شماره
صفحات -
تاریخ انتشار 2006