View : 13 Download: 0

Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions

Title
Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions
Authors
Shim K.-A.
Ewha Authors
심경아
Issue Date
2007
Journal Title
Computer Standards and Interfaces
ISSN
0920-5489JCR Link
Citation
vol. 29, no. 4, pp. 467 - 470
Indexed
SCIE; SCOPUS WOS scopus
Abstract
The MQV protocol is the first authenticated key agreement protocol which uses a digital signature to sign Diffie-Hellman public keys without using any one-way hash functions. Based on the MQV protocol, Harn and Lin proposed an authenticated multiple-key agreement protocol that enables two parties to establish multiple common secret keys in a single protocol run. But the protocol was subsequently found to be flawed. Tseng proposed a new generalized MQV key agreement protocol without using one-way hash functions to overcome the weaknesses of Harn-Lin's protocol. Recently, Shao showed that Teng's protocol is insecure against signature forgery attacks and then proposed an improved authenticated multiple-key agreement protocol to resist the attacks. In this paper we show that Shao's protocol is vulnerable to unknown key-share attacks. We also point out its another potential weakness. © 2006 Elsevier B.V. All rights reserved.
DOI
10.1016/j.csi.2006.11.002
Appears in Collections:
자연과학대학 > 수학전공 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE