View : 570 Download: 0

Impersonation attacks on key agreement protocols resistant to denial of service attacks

Title
Impersonation attacks on key agreement protocols resistant to denial of service attacks
Authors
Shim K.-A.
Ewha Authors
심경아
Issue Date
2006
Journal Title
IEICE Transactions on Information and Systems
ISSN
0916-8532JCR Link
Citation
IEICE Transactions on Information and Systems vol. E89-D, no. 7, pp. 2306 - 2309
Indexed
SCIE; SCOPUS WOS scopus
Document Type
Conference Paper
Abstract
Hirose and Yoshida proposed an authenticated key agreement protocol based on the intractability of the Computational Diffie-Hellman problem. Recently, Hirose and Matsuura pointed out that Hirose and Yoshida's protocol is vulnerable to Denial-of-Service (DoS) attacks. And they proposed two key agreement protocols which are resistant to the DoS attacks. Their protocols are the first authenticated key agreement protocols resistant to both the storage exhaustion attack and the CPU exhaustion attack. In this paper we show that Hirose and Matsuura's DoS-resistant key agreement protocols and Hirose and Yoshida's key agreement protocol are vulnerable to impersonation attacks. We make suggestions for improvements. Copyright © 2006 The Institute of Electronics, Information and Communication Engineers.
DOI
10.1093/ietisy/e89-d.7.2306
Appears in Collections:
자연과학대학 > 수학전공 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE