کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
427920 686576 2011 10 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Security weaknesses of authenticated key agreement protocols
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Security weaknesses of authenticated key agreement protocols
چکیده انگلیسی

In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of Hölbl et al. After the analysis, we found that Tan et al.ʼs, Lim et al.ʼs and two protocols of Hölbl et al. are insecure against the impersonation attack and the man-in-the-middle attack, Chen et al.ʼs protocol cannot withstand the key-compromise impersonation attack, one protocol of Hölbl et al. is vulnerable to the insider attack, one allows an adversary to compute the private key of any user and one protocol allows her to compute the shared secret key.


► Tanʼs, Limʼs and Hölblʼs protocols are vulnerable to impersonation and mitm attack.
► Chen et al.ʼs protocol cannot withstand the key-compromise impersonation attack.
► Hölbl et al.ʼs protocol allows an adversary to compute the private key of any user.
► Hölbl et al.ʼs protocol allows an adversary to compute the shared secret key.
► Hölbl et al.ʼs protocol is vulnerable to the insider attack.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information Processing Letters - Volume 111, Issue 14, 31 July 2011, Pages 687–696
نویسندگان
,