首页 | 本学科首页   官方微博 | 高级检索  
     


Extended KCI attack against two-party key establishment protocols
Authors:Qiang Tang  Liqun Chen
Affiliation:a DIES, Faculty of EEMCS, University of Twente, The Netherlands
b Hewlett-Packard Laboratories, Bristol, UK
Abstract:We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a key agreement protocol, and it seems practical because the adversary could obtain the victim?s ephemeral secret in a number of methods; for example, by installing some Trojan horse into the victim?s computer platform or by exploiting the imperfectness of the pseudo-random number generator in the platform. We demonstrate that the 3-pass HMQV protocol, which is secure against the standard KCI attack, is vulnerable to this new attack. Furthermore, we show a countermeasure to prevent such an attack.
Keywords:Cryptography  Key establishment  KCI attack  Extended KCI attack
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号