A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cryptanalysis of an Identity-Based Authenticated Key Exchange Protocol
[article]
2017
arXiv
pre-print
Elashry, Mu and Susilo proposed in 2015 an Identity Based Authenticated Key Exchange (IBAKE) protocol where different parties establish secure communication by means of their public identities. ...
Authenticated Key Exchange (AKE) protocols represent an important cryptographic mechanism that enables several parties to communicate securely over an open network. ...
Secondly, we propose an efficient attack where an adversary can easily compute any bit of a shared key if just one secret bit is known, which contradicts authors' claim.
ACKNOWLEDGMENTS A. ...
arXiv:1611.07299v2
fatcat:oeguzxprzzhhxd2uljs3gpbmbm
Cryptanalysis Of Two-Factor Authenticated Key Exchange Protocol In Public Wireless Lans
2009
Zenodo
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. ...
They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.' ...
Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs
3) Authentication and key exchange stage In this stage, a mutual authentication between A and B is performed and ...
doi:10.5281/zenodo.1073560
fatcat:wsgbbxkvfjgpdptru2plr7w5uq
Comment on "Provably secure biometric-based client-server secure communication over unreliable networks"
[article]
2022
arXiv
pre-print
In key agreement protocols, the user will send a request to the server and the server will respond to that message. After two-way authentication, a secure session key will be created between them. ...
In 2021, Saleem et al. proposed a protocol for securing user and server communications, claiming that their proposed protocol meets a variety of security needs and is also resistant to known types of attacks ...
s scheme[3] Notation Description C c cth client S s sth server ID c Identity of C c P W c Password of C c B c Biometric of C c E p (a, b) Elliptic curve over Z p P Base point of E p (a, b) s Secret key ...
arXiv:2206.13172v1
fatcat:at7dlatlcndsdknlx4tfnobsye
Cryptanalysis of a Practical Quantum Key Distribution With Polarization-Entangled Photons
[article]
2004
arXiv
pre-print
Recently, a quantum key exchange protocol has been described, which served as basis for securing an actual bank transaction by means of quantum cryptography [quant-ph/0404115]. ...
Here we show, that the authentication scheme applied is insecure in the sense that an attacker can provoke a situation where initiator and responder of a key exchange end up with different keys. ...
Acknowledgements We are indebted to Momtchil Peev for his detailed explanations of the authentication step of the quantum key exchange protocol. ...
arXiv:quant-ph/0407130v1
fatcat:vvai57jmjrctpg6oynhobcxyt4
Cryptanalysis of two password-authenticated key exchange protocols between clients with different passwords
2007
International Mathematical Forum
In large-scale client-client communication environments, Password-Authenticated Key Exchange (PAKE) based on trusted server is very convenient in key management. ...
However, in this paper, we show that the Wang-Mo protocol and the Yoon-Yoo protocol exist impersonation attack. ...
Acknowledgments This work was supported by the Science and Technology Foundation of CUMT and the Open Project of State Key Laboratory of Information Security. ...
doi:10.12988/imf.2007.07047
fatcat:qbvlqftsv5ectirwyxm5tn34rm
Cryptanalysis of Lee et al.'s authenticated group key agreement
2011
Procedia Engineering
In 2009, Cheng-chi Lee et al. proposed a new authenticated group key agreement based on a novel bilinear pairing to provide integrity of the transmitted messages. ...
Authenticated key agreement protocols are to authenticate the users who will start a conversation and establish a common session key. ...
Authenticated group key agreement protocol describes some messages exchanged by a group of users in order that each user can recognize the others' identities and make an agreement on their common session ...
doi:10.1016/j.proeng.2011.08.263
fatcat:5juzb5535fbrpcn2c6ukor4s2e
A lightweight IoT security protocol
2017
2017 1st Cyber Security in Networking Conference (CSNet)
In order to protect the WSN, a mutual authentication between devices is required during the association of a new device. The exchanged data should be authenticated and encrypted. ...
In this work we propose a robust, lightweight and energy-efficient security protocol for the WSN systems. The real tests we made and a performance evaluation of our security protocol are provided. ...
RELATED WORK In [7] , we proposed an authentication protocol for securing the IoT system OCARI, an industrial WSN for constrained environment. It was based on pre-shared keys. ...
doi:10.1109/csnet.2017.8242001
dblp:conf/csnet/HammiLBSM17
fatcat:jqabynh7kjabflo3ywjwq4f4by
Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication
2011
30th IEEE International Performance Computing and Communications Conference
We then suggest an improvement on the protocol to prevent the clogging attack. The other protocol we consider is a two-party identity-based authenticated key agreement protocol by Hölbl et al. ...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. ...
We showed that the attack on this protocol could be avoided by using an additional step of exchanging numbers. The second protocol we considered is a key exchange scheme. ...
doi:10.1109/pccc.2011.6108113
dblp:conf/ipccc/RoyDL11
fatcat:aaxhlpnp7neyvjzckuknclgili
Photuris: Design Criteria
[chapter]
2000
Lecture Notes in Computer Science
Historic look at design principles and requirements for a practical key management communication protocol. Refinement of terms, threat environment and limitations, and necessary features. ...
Dynamic computational time and network round-trip time are well integrated with protocol specification. First use of anti-clogging tokens to defend against resource attacks. ...
Photuris [KS99] was based on currently available tools, by experienced network protocol designers with an interest in cryptography, rather than by cryptographers with an interest in network protocols ...
doi:10.1007/3-540-46513-8_17
fatcat:rmct7h4upjbzbhtgpishvio4n4
Cryptanalysis of provably secure gateway-oriented password-based authenticated key exchange protocol
2013
Applied Mathematical Sciences
In general, a gateway-oriented password-based authenticated key exchange (GPAKE) protocol allows a client to establish an authenticated session key with a gateway via the help of an authentication server ...
In 2013, Chien-Wu-Yeh proposed a new GPAKE protocol and then proved its security in an enhanced model. ...
[1] first proposed a gateway-oriented password-based authenticated key exchange (GPAKE) protocol among a client, a gateway, and an authentication server, where a password was only shared between the ...
doi:10.12988/ams.2013.39529
fatcat:dhf2zgrwnbaejozxkwg4poov2q
Secure communication mechanisms for GSM networks
1999
IEEE transactions on consumer electronics
An authentication protocol and a key gcncnltion method arc presented in conjunction with the propo.sed 'Irchitcctllt·C, Cryptanalysis and operatiollal analysis . ...
Ihnw that the authentication protocol h .WClIfC and efficient. ...
The X.509 Three-way Exchange (2l] The X.509 three-way exchange, described ill ITU-T Recommendations X.50C), is a novel example of a public-key based authentication protocol. ...
doi:10.1109/30.809184
fatcat:qgxecc3xujgfje4zaoqzgzep3y
Dynamic Key Cryptography and Applications
2010
International Journal of Network Security
However, cryptography itself is subject to cryptanalysis attacks. To reduce the cryptanalysis attack risk, a dynamic key theory is presented and analyzed in this paper. ...
Because these dynamic keys are one-time used symmetric cryptographic keys, they can significantly improve the security of cryptographic systems. ...
The rest of the messages in authentication protocol is similar to traditional authentication protocols but without session key exchange. ...
dblp:journals/ijnsec/NgoWLWS10
fatcat:jhgpcjng3ffedkpytd7mzagt7i
A Secure and Efficient ECC-Based Anonymous Authentication Protocol
2019
Security and Communication Networks
To eliminate the security vulnerabilities of existing schemes, we propose an improved authentication scheme based on elliptic curve cryptosystem. ...
Nowadays, remote user authentication protocol plays a great role in ensuring the security of data transmission and protecting the privacy of users for various network services. ...
's scheme, we propose an improved anonymous authentication protocol using ECC. The proposed scheme establishes secure session key based on Diffie-Hellman key exchange. ...
doi:10.1155/2019/4656281
fatcat:yc5pjirmlbc5xmyajlpujk6mnm
Authentication protocols for the broadband ISDN billing system
1999
Computer Standards & Interfaces
Both protocols are designed in conjunction with a suggested key management method. Cryptanalysis shows that both the MAP and the PAP are very secure. ...
The membership authentication protocol MAP and the personal authentication protocol PAP are proposed to support the authentication requirements of the flat rate and usage-based rate billing policies, respectively ...
The STS protocol is another example of publickey-based authentication protocols. The STS perw x forms Diffie-Hellman 7 key exchange, followed by w x signature exchange. ...
doi:10.1016/s0920-5489(99)00024-0
fatcat:glyrrzoyqnaqnjaiqji6wtebbi
Cryptanalysis of Song's advanced smart card based password authentication protocol
[article]
2011
arXiv
pre-print
Song Song10 proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu ...
In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals. ...
The common adversary model to analyze the security of authentication protocols based on smart cards assumes an attacker with full control over the communication channel between the user and the server. ...
arXiv:1111.2744v1
fatcat:xoogfn66bbd73blz2rtnxd4vsm
« Previous
Showing results 1 — 15 out of 1,854 results