Cryptanalysis of a strongly secure authenticated key exchange protocol

被引:0
|
作者
PLA Information Engineering University, Zhengzhou 450002, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2013年 / 9卷 / 2278-2282期
关键词
D O I
10.3724/SP.J.1146.2012.01380
中图分类号
学科分类号
摘要
In the 15th (2012) IACR international conference on practice and theory of Public-Key Cryptography (PKC), Fujioka et al. proposed a generic construction of Authenticated Key Exchange (AKE) from a Key Encapsulation Mechanism (KEM), which is called the GC protocol and is proven to be secure in the CK+ security model. In this paper, it is pointed out by cryptanalysis that the GC protocol is not CK+ secure. Concrete attacks in which the outside adversary, without knowing the static or ephemeral keys of the users, imitates a valid user are also given. Further, the errors in the original security proof are analyzed.
引用
收藏
相关论文
共 50 条
  • [1] A New Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Ma, Chuangui
    Hu, Xuexian
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 135 - 144
  • [2] A New Efficient and Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Han, Guangguo
    Ma, Chuangui
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 499 - 502
  • [3] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8
  • [4] A strongly secure identity-based authenticated group key exchange protocol
    TENG JiKai
    WU ChuanKun
    TANG ChunMing
    TIAN YouLiang
    ScienceChina(InformationSciences), 2015, 58 (09) : 98 - 109
  • [5] A strongly secure identity-based authenticated group key exchange protocol
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    Tian YouLiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (09) : 1 - 12
  • [6] An efficient strongly secure authenticated key exchange protocol without random oracles
    Yang, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1461 - 1473
  • [7] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [8] Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
    Huang, Hai
    PROVABLE SECURITY, 2011, 6980 : 389 - 397
  • [9] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [10] Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices
    Pursharthi, Komal
    Mishra, Dheerendra
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)