Unknown Key - Share Attacks on theStation - to - Station ( STS )
نویسندگان
چکیده
This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key connrmation. Various methods are considered for preventing the attacks.
منابع مشابه
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key confirmation. Various methods are considered for preventing the attacks.
متن کاملPrivacy Enhanced Key Agreement for Public Safety Communication in Wireless Mesh Networks
With the requirements of mobility, flexibility, and rapid response, wireless mesh networks are widely used for emergency services to improve the efficiency of public safety communication to prevent or respond to incidents that harm or endanger persons or property. In this paper, we propose a practical scheme of key agreement with asymmetric encryption based on station-to-station protocol and a ...
متن کاملEnhanced Flush+Reload Attack on AES
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملAuthentication and Authenticated Key Exchanges
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure p...
متن کامل