Impersonation Attack on a Strong ID-Based Key Distribution
نویسندگان
چکیده
Jeong et al. recently have proposed a strong ID-based key distribution scheme in order to achieve security against long-term key reveal and session state reveal attacks. In this letter, we show that, unfortunately, the ID-based key distribution scheme is vulnerable to an impersonation attack such that anyone can manipulate public transcripts generated by a user to impersonate the original user. key words: ID-based key distribution, impersonation
منابع مشابه
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol
In this article we show that Shim’s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their protocol. Keyword: ID-based, Weil-paring, impersonation attack, tripartite authenticated key agreement, unknown key share attack.
متن کاملA Key Distribution and Management Scheme for Clustered Ad Hoc Sensor Networks
Presently, the most practical approach for bootstrapping initial secret keys in sensor networks is to load keys into sensor nodes before they are deployed [54, 57]. These initial keys are used to establish pairwise keys for node-to-node communications. After that, the pairwise keys are used to distribute cluster keys for broadcasting messages. However, some of them are vulnerable to impersonati...
متن کاملImpersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards
Recently, Das et al. proposed a dynamic ID-based verifierfree password authentication scheme using smart cards. To resist the IDtheft attack, the user’s login ID is dynamically generated and one-time used. Herein, we demonstrate that Das et al.’s scheme is vulnerable to an impersonation attack, in which the adversary can easily impersonate any user to login the server at any time. Furthermore, ...
متن کاملImproved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider
Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir [1] proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. [12] proposed two-round ID-based AGKA protocol which is very efficient in communication a...
متن کاملComments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols
Recently, Cheng et al. proposed two tripartite key agreement protocols from pairings: one is certificate-based and the other is identity-based (ID-based). In this article, we show that the two schemes are vulnerable to the insider impersonation attack and the ID-based scheme even discloses the entities’ private keys. Solutions to this problem are discussed.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 91-B شماره
صفحات -
تاریخ انتشار 2008