首页 | 本学科首页   官方微博 | 高级检索  
     


Vulnerability of two multiple-key agreement protocols
Authors:Mohammad Sabzinejad FarashAuthor Vitae  Majid BayatAuthor Vitae
Affiliation:a Department of Mathematics and Computer Sciences, Tarbiat Moallem University, Tehran, Iran
b Faculty of Electrical and Computer Engineering, K.N. Toosi University, Tehran, Iran
Abstract:In 2008, Lee et al. proposed two multiple-key agreement protocols, first one based on elliptic curve cryptography (ECC) and the other one, based on bilinear pairings. Shortly after publication, Vo et al. showed that the Lee-Wu-Wang’s pairing-based protocol is vulnerable to impersonation attack then for removing the problem, they proposed an improved protocol. In this paper, first We show that the Lee-Wu-Wang’s ECC-based protocol is insecure against forgery attack and also, if long-term private keys of two entities and one key of the session keys are revealed, the other session keys are exposed too. Then, we demonstrate that the Vo-Lee-Yeun-Kim’s protocol is vulnerable to another kind of forgery attacks and a reflection attack.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号