کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
429035 | 687010 | 2011 | 4 صفحه PDF | دانلود رایگان |

We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a key agreement protocol, and it seems practical because the adversary could obtain the victimʼs ephemeral secret in a number of methods; for example, by installing some Trojan horse into the victimʼs computer platform or by exploiting the imperfectness of the pseudo-random number generator in the platform. We demonstrate that the 3-pass HMQV protocol, which is secure against the standard KCI attack, is vulnerable to this new attack. Furthermore, we show a countermeasure to prevent such an attack.
► We introduce the concept of extended KCI attack.
► We mount this attack against the 3-pass HMQV protocol.
► We propose a countermeasure against the attack.
Journal: Information Processing Letters - Volume 111, Issue 15, 15 August 2011, Pages 744–747