Cryptanalysis of a strongly secure authenticated key exchange protocol

被引:0
|
作者
PLA Information Engineering University, Zhengzhou 450002, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2013年 / 9卷 / 2278-2282期
关键词
D O I
10.3724/SP.J.1146.2012.01380
中图分类号
学科分类号
摘要
In the 15th (2012) IACR international conference on practice and theory of Public-Key Cryptography (PKC), Fujioka et al. proposed a generic construction of Authenticated Key Exchange (AKE) from a Key Encapsulation Mechanism (KEM), which is called the GC protocol and is proven to be secure in the CK+ security model. In this paper, it is pointed out by cryptanalysis that the GC protocol is not CK+ secure. Concrete attacks in which the outside adversary, without knowing the static or ephemeral keys of the users, imitates a valid user are also given. Further, the errors in the original security proof are analyzed.
引用
收藏
相关论文
共 50 条
  • [21] Strongly secure authenticated key exchange from factoring, codes, and lattices
    Atsushi Fujioka
    Koutarou Suzuki
    Keita Xagawa
    Kazuki Yoneyama
    Designs, Codes and Cryptography, 2015, 76 : 469 - 504
  • [22] Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction
    Lu, Siqi
    Zhao, Jinhua
    Cheng, Qingfeng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 567 - 578
  • [23] Cryptanalysis of the improved authenticated key agreement protocol
    Chang, TY
    Yang, CC
    Yang, YW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 771 - 774
  • [24] Cryptanalysis of modified authenticated key agreement protocol
    Ku, WC
    Wang, SD
    ELECTRONICS LETTERS, 2000, 36 (21) : 1770 - 1771
  • [25] Strongly Secure Key Exchange Protocol with Minimal KEM
    Tian, Baoping
    Wei, Fushan
    Ma, Chuangui
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 139 - 153
  • [26] A strongly secure and efficient certificateless authenticated asymmetric group key agreement protocol
    Sun H.
    Cai Z.
    Zhang J.
    Zhang L.
    Gan Y.
    Sun, Haiyan (sunhaiyan2520@163.com), 2018, Totem Publishers Ltd (14) : 2831 - 2841
  • [27] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):
  • [28] A secure threshold anonymous password-authenticated key exchange protocol
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 444 - +
  • [29] Efficient and secure password-based authenticated key exchange protocol
    Wu, Shuhua
    Zhu, Yuefei
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1269 - 1272
  • [30] An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET
    Park, Youngho
    Rhee, Kyung-Hyune
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 810 - 817