Cryptanalysis of the Dragonfly key exchange protocol

被引:11
|
作者
Clarke, Dylan [1 ]
Hao, Feng [1 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
SECURE;
D O I
10.1049/iet-ifs.2013.0081
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dragonfly is a password authenticated key exchange protocol that has been submitted to the Internet engineering task force as a candidate standard for general internet use. The authors analysed the security of this protocol and devised an attack that is capable of extracting both the session key and password from an honest party. This attack was then implemented and experiments were performed to determine the time-scale required to successfully complete the attack.
引用
收藏
页码:283 / 289
页数:7
相关论文
共 50 条
  • [2] Cryptanalysis of a lattice based key exchange protocol
    Mao, Shaowu
    Zhang, Pei
    Wang, Houzhen
    Zhang, Huanguo
    Wu, Wanqing
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (02)
  • [3] Another Cryptanalysis of a Tropical Key Exchange Protocol
    Jackson, J.
    Perumal, R.
    IAENG International Journal of Computer Science, 2023, 50 (04)
  • [4] Cryptanalysis of a lattice based key exchange protocol
    Shaowu MAO
    Pei ZHANG
    Houzhen WANG
    Huanguo ZHANG
    Wanqing WU
    Science China(Information Sciences), 2017, 60 (02) : 196 - 198
  • [5] Cryptanalysis of a key exchange protocol based on the ring
    Zhang, Yang
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (02) : 103 - 112
  • [6] Cryptanalysis of a strongly secure authenticated key exchange protocol
    PLA Information Engineering University, Zhengzhou 450002, China
    不详
    Dianzi Yu Xinxi Xuebao, 2013, 9 (2278-2282):
  • [7] Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
    Jia Jianwei
    Liu Jinhui
    Zhang Huanguo
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (05) : 947 - 951
  • [8] Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices
    JIA Jianwei
    LIU Jinhui
    ZHANG Huanguo
    Chinese Journal of Electronics, 2017, 26 (05) : 947 - 951
  • [9] Cryptanalysis of Key Exchange Protocol Based on Tensor Ergodic Problem
    Gu, Chunsheng
    Gu, Youyu
    Shi, Peizhong
    Ge, Chunpeng
    Jing, Zhenjun
    CHINA COMMUNICATIONS, 2018, 15 (10) : 172 - 181
  • [10] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)