Analyzing the security flaws of internet key exchange protocols

被引:0
|
作者
Zhang, Yong [1 ]
Feng, Dong-Lei [1 ]
Chen, Han-Sheng [1 ]
Bai, Ying-Cai [1 ]
机构
[1] Dept. of Comp. Sci. and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
来源
Ruan Jian Xue Bao/Journal of Software | 2002年 / 13卷 / 06期
关键词
Artificial intelligence - Cryptography - Internet - Modification - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
IKE (Internet key exchange, RFC2409) describes a suite of Internet key exchange protocols for establishing security associations and obtaining authenticated keying material. A security flaw in these IKE protocols is observed and a simple modification is proposed. It is pointed out that there is a neglected security flaw in the amended IKE protocols. And a successful attack on the amended IKE protocols is also provided. A new amendment to IKE protocols is proposed, and the reasons which cause the two security flaws are analyzed by using BAN logic successfully.
引用
收藏
页码:1173 / 1177
相关论文
共 50 条
  • [1] Analyzing Internet security protocols
    Yasinsac, A
    Childs, J
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 149 - 159
  • [2] Security flaws in authentication and key establishment protocols for mobile communications
    Shim, K
    Lee, YR
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 62 - 74
  • [3] Comparative Analysis of Internet Key Exchange Protocols
    Shaheen, Safdar Hussain
    Yousaf, Muhammad
    Majeed, Muhammad Younas
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
  • [4] Analysis and modification of the Internet Key Exchange Protocols
    Jianfan Wei Renliang Yuan (Communication
    [J]. 信息安全与通信保密, 2005, (07) : 156 - 159
  • [5] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [6] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [7] Security Analysis of Broadcaster Group Key Exchange Protocols
    LI Li~ 1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1577 - 1580
  • [8] ON THE IMPORTANCE OF MEMORY RESOURCES IN THE SECURITY OF KEY EXCHANGE PROTOCOLS
    DAVIDA, G
    DESMEDT, Y
    PERALTA, R
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 11 - 15
  • [9] Security of Group Key Exchange Protocols with Different Passwords
    Phan, Raphael C. -W.
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
  • [10] Comparative evaluation of successor Protocols to Internet Key Exchange (IKE)
    Haddad, H
    Mirmohamadi, H
    [J]. 2005 3rd IEEE International Conference on Industrial Informatics (INDIN), 2005, : 692 - 696