๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Vulnerability of two multiple-key agreement protocols

โœ Scribed by Mohammad Sabzinejad Farash; Majid Bayat; Mahmoud Ahmadian Attari


Publisher
Elsevier Science
Year
2011
Tongue
English
Weight
195 KB
Volume
37
Category
Article
ISSN
0045-7906

No coin nor oath required. For personal study only.

โœฆ Synopsis


In 2008, Lee et al. proposed two multiple-key agreement protocols, first one based on elliptic curve cryptography (ECC) and the other one, based on bilinear pairings. Shortly after publication, Vo et al. showed that the Lee-Wu-Wang's pairing-based protocol is vulnerable to impersonation attack then for removing the problem, they proposed an improved protocol. In this paper, first We show that the Lee-Wu-Wang's ECC-based protocol is insecure against forgery attack and also, if long-term private keys of two entities and one key of the session keys are revealed, the other session keys are exposed too. Then, we demonstrate that the Vo-Lee-Yeun-Kim's protocol is vulnerable to another kind of forgery attacks and a reflection attack.


๐Ÿ“œ SIMILAR VOLUMES


Enhancements of authenticated multiple k
โœ Duc-Liem Vo; Hyunrok Lee; Chan-Yeob Yeun; Kwangjo Kim ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 160 KB

Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate