Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol

被引:18
|
作者
Wang, Shengbao [1 ]
Cao, Zhenfu [1 ]
Strangio, Maurizio Adriano [2 ]
Wang, Lihua [3 ]
机构
[1] Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
[2] Univ Rome, Dept Math, Rome, Italy
[3] Natl Inst Informat & Commun Technol, Informat Secur Res Ctr, Tokyo, Japan
基金
中国国家自然科学基金;
关键词
key agreement; elliptic curve cryptography; Diffie-Hellman protocol; key-compromise impersonation; MQV;
D O I
10.1109/LCOMM.2008.071307
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In SAC'05, Strangio proposed protocol ECKE1 as an efficient, elliptic curve Diffie-Hellman two-party key, agreement protocol using public key authentication. In this letter, we show that protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We also present an improved protocol - ECKE-1N, which can withstand such attacks. The new protocol's performance is comparable to the well-known MQV protocol and maintains the same remarkable list of security properties.
引用
收藏
页码:149 / 151
页数:3
相关论文
共 50 条
  • [1] A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4611 - 4614
  • [2] Secure E-passport Protocol using Elliptic Curve Diffie-Hellman Key Agreement Protocol
    Abid, Mohamed
    Afifi, Hossam
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 99 - 102
  • [3] Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancement
    Mohammad, Zeyad
    Lo, Chi-Chun
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 128 - 132
  • [4] Implementation of Elliptic Curve Diffie-Hellman Key Agreement Scheme on IRIS Nodes
    Zhang, Xing
    Ma, Shaohua
    Han, Dong
    Shi, Wei
    [J]. PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTERNET OF THINGS, 2015, : 160 - 163
  • [5] Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
    Senekane, Makhamisa
    Qhobosheane, Sehlabaka
    Taele, B. M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 30 - 34
  • [6] A New Approach of Elliptic Curve Diffie-Hellman Key Exchange
    Mehibel, Nissa
    Hamadouche, M'hamed
    [J]. 2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [7] Authenticated Diffie-Hellman Key Agreement Protocol with Forward Secrecy
    ZHANG Chuanrong1
    2. State Key Laboratory of Information Security/Graduate University of Chinese Academy of Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 641 - 644
  • [8] On Diffie-Hellman key agreement with short exponents
    vanOorschot, PC
    Wiener, MJ
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 332 - 343
  • [9] Interpolation of the elliptic curve Diffie-Hellman mapping
    Lange, T
    Winterhof, A
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 51 - 60
  • [10] On the bits of elliptic curve Diffie-Hellman keys
    Jao, David
    Jetchev, Dimitar
    Venkatesan, Ramarathnam
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 33 - +