Cryptanalysis of Tseng-Wu group key exchange protocol

被引:0
|
作者
Department of Computer Science and Information Engineering, Asia University, No. 500, Lioufeng Rd., Wufeng, Taichung [1 ]
41354, Taiwan
不详 [2 ]
40402, Taiwan
机构
来源
Int. J. Netw. Secur. | / 3卷 / 590-593期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Tseng and Wu pointed out that the second pro-tocol of Biswas's two-party keys scheme based on the Diffe-Hellman technique has a security weakness and pro-posed a new protocol to remedy the weakness. In this article, we point out that Tseng-Wu's protocol is vulner-able to a man-in-the-middle attack. An attacker could intercept, delete, or modify the communicated messages between two communicating party or among the group members.
引用
收藏
相关论文
共 50 条
  • [1] Cryptanalysis of the Wu-Varadhrajan fair exchange protocol
    Markowitch, O
    Saeednia, S
    INFORMATION PROCESSING LETTERS, 2003, 87 (03) : 169 - 171
  • [3] Cryptanalysis of the Dragonfly key exchange protocol
    Clarke, Dylan
    Hao, Feng
    IET INFORMATION SECURITY, 2014, 8 (06) : 283 - 289
  • [4] Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols
    Chien, HY
    Wu, TC
    Jan, JK
    Tseng, YM
    INFORMATION PROCESSING LETTERS, 2001, 80 (02) : 113 - 117
  • [5] Cryptanalysis of a Group Key Establishment Protocol
    Martinez Carracedo, Jorge
    Suarez Corona, Adriana
    SYMMETRY-BASEL, 2021, 13 (02): : 1 - 10
  • [6] Another Cryptanalysis of a Tropical Key Exchange Protocol
    Jackson, J.
    Perumal, R.
    IAENG International Journal of Computer Science, 2023, 50 (04)
  • [7] Cryptanalysis of a lattice based key exchange protocol
    Mao, Shaowu
    Zhang, Pei
    Wang, Houzhen
    Zhang, Huanguo
    Wu, Wanqing
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (02)
  • [8] Cryptanalysis of a lattice based key exchange protocol
    Shaowu MAO
    Pei ZHANG
    Houzhen WANG
    Huanguo ZHANG
    Wanqing WU
    ScienceChina(InformationSciences), 2017, 60 (02) : 196 - 198
  • [9] Cryptanalysis of a key exchange protocol based on the ring
    Zhang, Yang
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (02) : 103 - 112
  • [10] Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing
    Olimid, Ruxandra E.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (04): : 1585 - 1590