Cryptanalysis of Ateniese-Steiner-Tsudik-Authenticated Group Key Management Protocol

被引:0
|
作者
Portela, Daniel Camazon [1 ]
Sanchez, Alvaro Otero [1 ]
Lopez-Ramos, Juan Antonio [1 ]
机构
[1] Univ Almeria, Dept Math, Almeria 04120, Spain
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 18期
关键词
cryptography; authenticated group key agreement; active attack; security model; elliptic curves; AGREEMENT; SECURE;
D O I
10.3390/app14188179
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
We present an active attack that targets Ateniese et al.'s authenticated group key agreement, which, as a particular case, includes the well-known multiparty key exchange protocol CLIQUES that allows a group of users to build a common secret using some private values in a collaborative and distributed way, naturally extending the foundational key exchange introduced by Diffie and Hellman between two communicating parties that motivated the birth of public key cryptography. Ateniese et al.'s protocol adds some authentication information, allowing the parties to trust the exchanged information, but we show that it is possible to surpass this as well. The attack allows a malicious party to agree on a secret with the rest of the legal members of the group without their knowledge, so all the distributed information can be accessed using this secret. In addition, this is shown under a well-known cryptographic model that, in principle, requires absolute control of group communications, but, in fact, it only requires malicious control of the communications of a single arbitrary user and only for the duration of the key exchange. This means that after the attack, the malicious party does not have to take any other actions that could reveal a clue that an attack occurred and that the distributed information is being illegally accessed, contrary to a typical man-in-the-middle attack where the attacker has to continue the activity, meaning this could be detected at some point.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Cryptanalysis of the improved authenticated key agreement protocol
    Chang, TY
    Yang, CC
    Yang, YW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 171 (02) : 771 - 774
  • [2] Cryptanalysis of modified authenticated key agreement protocol
    Ku, WC
    Wang, SD
    ELECTRONICS LETTERS, 2000, 36 (21) : 1770 - 1771
  • [3] Cryptanalysis of a strongly secure authenticated key exchange protocol
    PLA Information Engineering University, Zhengzhou 450002, China
    不详
    Dianzi Yu Xinxi Xuebao, 2013, 9 (2278-2282):
  • [4] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [5] Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices
    Pursharthi, Komal
    Mishra, Dheerendra
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)
  • [6] Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
    He, Debiao
    ETRI JOURNAL, 2012, 34 (03) : 482 - 484
  • [7] Cryptanalysis of a Group Key Establishment Protocol
    Martinez Carracedo, Jorge
    Suarez Corona, Adriana
    SYMMETRY-BASEL, 2021, 13 (02): : 1 - 10
  • [8] Mutually Authenticated Group Key Management Protocol for Healthcare IoT Networks
    Kausar, Firdous
    Aman, Waqas
    Al-Abri, Dawood
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 2, 2020, 1070 : 1 - 12
  • [9] Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    International Journal of Network Security, 2023, 25 (05) : 764 - 776
  • [10] An efficient authenticated group key agreement protocol
    He Yong-Zhong
    Han Zhen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 250 - +