Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol

نویسندگان

  • Simon Blake-Wilson
  • Alfred Menezes
چکیده

This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key confirmation. Various methods are considered for preventing the attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unknown Key - Share Attacks on theStation - to - Station ( STS )

This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key connrmation. Various methods are considered for preventing the attacks.

متن کامل

Privacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks

With the requirements of mobility, flexibility, and rapid response, wireless mesh networks are widely used for emergency services to improve the efficiency of public safety communication to prevent or respond to incidents that harm or endanger persons or property. In this paper, we propose a practical scheme of key agreement with asymmetric encryption based on station-to-station protocol and a ...

متن کامل

Authentication and Authenticated Key Exchanges

We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure p...

متن کامل

AES Based Security Architecture Of WIMAX Using OMNET++

Although WiMAX is considered to be the last mile protocol but its security still remains a question because it neither encrypts the MAC (Media access control) headers nor the media MAC management messages. Therefore, an attacker can easily launch passive attacks to monitor WiMAX traffic and can retrieve valuable information from unencrypted MAC management messages. This research paper focuses o...

متن کامل

Proxy Base Station based Authentication Protocol for Broadband Wireless Network

The fourth generation technology of broadband wireless networks i.e. WiMAX (Worldwide Interoperability for Microwave Access) became popular due to its features like high speed internet access, large coverage area and interoperability for different type of devices. Non-Line ofsight propagation with lower frequency improvement makes WiMAX vulnerable to various security threats. Hence, authenticat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999