首页 | 本学科首页   官方微博 | 高级检索  
     


Security weaknesses of authenticated key agreement protocols
Authors:Peter Nose
Affiliation:a Institute of Mathematics, Physics and Mechanics, Ljubljana, Slovenia
b University of Ljubljana, FRI, Ljubljana, Slovenia
Abstract:In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of Hölbl et al. After the analysis, we found that Tan et al.?s, Lim et al.?s and two protocols of Hölbl et al. are insecure against the impersonation attack and the man-in-the-middle attack, Chen et al.?s protocol cannot withstand the key-compromise impersonation attack, one protocol of Hölbl et al. is vulnerable to the insider attack, one allows an adversary to compute the private key of any user and one protocol allows her to compute the shared secret key.
Keywords:Cryptography   Authentication   Key agreement   Key exchange   Two-party   Three-party   Tripartite   Bilinear pairing
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号