AN ACTIVE ATTACK ON A DISTRIBUTED GROUP KEY EXCHANGE SYSTEM

被引:1
|
作者
Baouch, Mohamed [1 ]
Antonio Lopez-Ramos, Juan [1 ]
Torrecillas, Blas [1 ]
Schnyder, Reto [2 ]
机构
[1] Univ Almeria, Dept Math, Ctra Sacramento S-N, Almeria 04120, Spain
[2] Univ Zurich, Inst Math, Winterthurerstr 190, CH-8057 Zurich, Switzerland
基金
瑞士国家科学基金会;
关键词
Multiparty key exchange; active attack; AGREEMENT;
D O I
10.3934/amc.2017052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.
引用
收藏
页码:715 / 717
页数:3
相关论文
共 50 条
  • [1] A collusion attack on asymmetric group key exchange
    Teng, Jikai
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2189 - 2193
  • [2] An compiler for effective group key exchange protocol to resist insider attack
    Zhang, Zijian
    Zhu, Liehuang
    Liao, Lejian
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2010, 40 (SUPPL. 2): : 313 - 317
  • [3] Scalable Group Key Exchange for Securing Distributed Operating Systems
    Nam, Junghyun
    Park, Minkyu
    Han, Sangchul
    Paik, Juryon
    Won, Dongho
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (05) : 829 - 857
  • [4] A secure and scalable group key exchange system
    Burmester, M
    Desmedt, Y
    INFORMATION PROCESSING LETTERS, 2005, 94 (03) : 137 - 143
  • [5] A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols
    Kreuzer, M.
    Myasnikov, A. D.
    Ushakov, A.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 37 - 43
  • [6] Key Reuse Attack on NewHope Key Exchange Protocol
    Liu, Chao
    Zheng, Zhongxiang
    Zou, Guangnan
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 163 - 176
  • [7] Member Tampering Attack on Burmester-Desmedt Group Key Exchange Protocol and Its Countermeasure
    Sun, Da-Zhi
    Tian, Yangguang
    MATHEMATICS, 2022, 10 (19)
  • [8] Attack on LAC Key Exchange in Misuse Situation
    Greuet, Aurelien
    Montoya, Simon
    Renault, Guenael
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 549 - 569
  • [9] Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack
    Mukesh, Rajeswari
    Damodaram, A.
    Bharathi, V. Subbiah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 14 - 20
  • [10] An Active Distributed Approach for Cyber Attack Detection
    Hoa Dinh Nguyen
    Gutta, Sandeep
    Cheng, Qi
    2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 1540 - 1544