Cryptanalysis of Ateniese-Steiner-Tsudik-Authenticated Group Key Management Protocol

被引:0
|
作者
Portela, Daniel Camazon [1 ]
Sanchez, Alvaro Otero [1 ]
Lopez-Ramos, Juan Antonio [1 ]
机构
[1] Univ Almeria, Dept Math, Almeria 04120, Spain
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 18期
关键词
cryptography; authenticated group key agreement; active attack; security model; elliptic curves; AGREEMENT; SECURE;
D O I
10.3390/app14188179
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
We present an active attack that targets Ateniese et al.'s authenticated group key agreement, which, as a particular case, includes the well-known multiparty key exchange protocol CLIQUES that allows a group of users to build a common secret using some private values in a collaborative and distributed way, naturally extending the foundational key exchange introduced by Diffie and Hellman between two communicating parties that motivated the birth of public key cryptography. Ateniese et al.'s protocol adds some authentication information, allowing the parties to trust the exchanged information, but we show that it is possible to surpass this as well. The attack allows a malicious party to agree on a secret with the rest of the legal members of the group without their knowledge, so all the distributed information can be accessed using this secret. In addition, this is shown under a well-known cryptographic model that, in principle, requires absolute control of group communications, but, in fact, it only requires malicious control of the communications of a single arbitrary user and only for the duration of the key exchange. This means that after the attack, the malicious party does not have to take any other actions that could reveal a clue that an attack occurred and that the distributed information is being illegally accessed, contrary to a typical man-in-the-middle attack where the attacker has to continue the activity, meaning this could be detected at some point.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states
    A. Meslouhi
    Y. Hassouni
    Quantum Information Processing, 2017, 16
  • [22] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [23] Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems
    Ma, Yuqian
    Ma, Yongliu
    Cheng, Qingfeng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [24] Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) : 1329 - 1343
  • [25] An improved Secure Authenticated Group Key Agreement Protocol for WMNs
    Jin, Zhen-Ai
    Park, Geum-Dal
    Yoo, Kee-Young
    ALPIT 2008: SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 412 - +
  • [26] An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks
    Saha, Mounita
    RoyChowdhury, Dipanwita
    E-BUSINESS AND TELECOMMUNICATIONS, 2011, 130 : 212 - 223
  • [27] A provable authenticated group key agreement protocol for mobile environment
    Sun, Hung-Min
    He, Bing-Zhe
    Chen, Chien-Ming
    Wu, Tsu-Yang
    Lin, Chia-Hsien
    Wang, Huaxiong
    INFORMATION SCIENCES, 2015, 321 : 224 - 237
  • [29] Cryptanalysis of Tseng-Wu group key exchange protocol
    Department of Computer Science and Information Engineering, Asia University, No. 500, Lioufeng Rd., Wufeng, Taichung
    41354, Taiwan
    不详
    40402, Taiwan
    Int. J. Netw. Secur., 3 (590-593):
  • [30] Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol
    Wei, Guiyi
    Yang, Xianbo
    Shao, Jun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (12): : 3352 - 3365