Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols

نویسنده

  • Kyung-Ah Shim
چکیده

In this paper, we show that the Nalla-Reddy’s one round IDbased tripartite authenticated key agreement protocols are still insecure against the man-in-the-middle attacks. We also break the Nalla’s IDbased tripartite authenticated key agreement protocol with signatures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ID-based tripartite Authenticated Key Agreement Protocols from pairings

This paper proposes ID-based tripartite authenticated key agreement protocols. The authenticated three party key agreement protocols from pairings [15], and the ID-based two party authenticated key agreement protocol [13] are studied. These two protocols are taken as the basis for designing three new ID-based tripartite authenticated key agreement protocols. The security properties of all these...

متن کامل

ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms

Nalla and Reddy [6] presented new ID-based tripartite authenticated key agreement protocols from parings. Recently, Boneh and Silverberg [4] studied a one round multi-party key agreement protocols using the certificates from multilinear forms. In this paper, we propose new ID-based multi-party authenticated key agreement protocols, which use the identity information of a user as his long-term p...

متن کامل

Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols

In this paper we propose security analysis on passive attack for Nalla-Reddy’s ID-AK-2 and ID-AK-3 protocols. Keywors:Passive attack,Tripartite key agreement,Bilinear pairings

متن کامل

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show that the protocols are insecure against the man-in-the middle attack, key compromise impersonation attack and several known-key attacks.

متن کامل

Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings

Recently, a number of ID-based two-party authenticated key agreement protocols which make of bilinear pairings have been proposed [3, 8, 12, 11, 14]. In this paper, we show that the Xie’s protocol [14] does not provide implicit key authentication and key-compromise impersonation resilience. Also, we point out the vulnerability of the Choi et al’s protocol [3] against signature forgery attacks.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2003  شماره 

صفحات  -

تاریخ انتشار 2003