Filters








1,854 Hits in 3.6 sec

Cryptanalysis of an Identity-Based Authenticated Key Exchange Protocol [article]

Younes Hatri and Ayoub Otmani and Kenza Guenda
2017 arXiv   pre-print
Elashry, Mu and Susilo proposed in 2015 an Identity Based Authenticated Key Exchange (IBAKE) protocol where different parties establish secure communication by means of their public identities.  ...  Authenticated Key Exchange (AKE) protocols represent an important cryptographic mechanism that enables several parties to communicate securely over an open network.  ...  Secondly, we propose an efficient attack where an adversary can easily compute any bit of a shared key if just one secret bit is known, which contradicts authors' claim. ACKNOWLEDGMENTS A.  ... 
arXiv:1611.07299v2 fatcat:oeguzxprzzhhxd2uljs3gpbmbm

Cryptanalysis Of Two-Factor Authenticated Key Exchange Protocol In Public Wireless Lans

Hyunseung Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim
2009 Zenodo  
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs.  ...  They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.'  ...  Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs 3) Authentication and key exchange stage In this stage, a mutual authentication between A and B is performed and  ... 
doi:10.5281/zenodo.1073560 fatcat:wsgbbxkvfjgpdptru2plr7w5uq

Comment on "Provably secure biometric-based client-server secure communication over unreliable networks" [article]

Mahdi Nikooghadam, Hamid Reza Shahriari
2022 arXiv   pre-print
In key agreement protocols, the user will send a request to the server and the server will respond to that message. After two-way authentication, a secure session key will be created between them.  ...  In 2021, Saleem et al. proposed a protocol for securing user and server communications, claiming that their proposed protocol meets a variety of security needs and is also resistant to known types of attacks  ...  s scheme[3] Notation Description C c cth client S s sth server ID c Identity of C c P W c Password of C c B c Biometric of C c E p (a, b) Elliptic curve over Z p P Base point of E p (a, b) s Secret key  ... 
arXiv:2206.13172v1 fatcat:at7dlatlcndsdknlx4tfnobsye

Cryptanalysis of a Practical Quantum Key Distribution With Polarization-Entangled Photons [article]

Thomas Beth and Joern Mueller-Quade and Rainer Steinwandt
2004 arXiv   pre-print
Recently, a quantum key exchange protocol has been described, which served as basis for securing an actual bank transaction by means of quantum cryptography [quant-ph/0404115].  ...  Here we show, that the authentication scheme applied is insecure in the sense that an attacker can provoke a situation where initiator and responder of a key exchange end up with different keys.  ...  Acknowledgements We are indebted to Momtchil Peev for his detailed explanations of the authentication step of the quantum key exchange protocol.  ... 
arXiv:quant-ph/0407130v1 fatcat:vvai57jmjrctpg6oynhobcxyt4

Cryptanalysis of two password-authenticated key exchange protocols between clients with different passwords

Tianjie Cao, Yongping Zhang
2007 International Mathematical Forum  
In large-scale client-client communication environments, Password-Authenticated Key Exchange (PAKE) based on trusted server is very convenient in key management.  ...  However, in this paper, we show that the Wang-Mo protocol and the Yoon-Yoo protocol exist impersonation attack.  ...  Acknowledgments This work was supported by the Science and Technology Foundation of CUMT and the Open Project of State Key Laboratory of Information Security.  ... 
doi:10.12988/imf.2007.07047 fatcat:qbvlqftsv5ectirwyxm5tn34rm

Cryptanalysis of Lee et al.'s authenticated group key agreement

Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu
2011 Procedia Engineering  
In 2009, Cheng-chi Lee et al. proposed a new authenticated group key agreement based on a novel bilinear pairing to provide integrity of the transmitted messages.  ...  Authenticated key agreement protocols are to authenticate the users who will start a conversation and establish a common session key.  ...  Authenticated group key agreement protocol describes some messages exchanged by a group of users in order that each user can recognize the others' identities and make an agreement on their common session  ... 
doi:10.1016/j.proeng.2011.08.263 fatcat:5juzb5535fbrpcn2c6ukor4s2e

A lightweight IoT security protocol

Mohamed Tahar Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet
2017 2017 1st Cyber Security in Networking Conference (CSNet)  
In order to protect the WSN, a mutual authentication between devices is required during the association of a new device. The exchanged data should be authenticated and encrypted.  ...  In this work we propose a robust, lightweight and energy-efficient security protocol for the WSN systems. The real tests we made and a performance evaluation of our security protocol are provided.  ...  RELATED WORK In [7] , we proposed an authentication protocol for securing the IoT system OCARI, an industrial WSN for constrained environment. It was based on pre-shared keys.  ... 
doi:10.1109/csnet.2017.8242001 dblp:conf/csnet/HammiLBSM17 fatcat:jqabynh7kjabflo3ywjwq4f4by

Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication

Swapnoneel Roy, Amlan Kumar Das, Yu Li
2011 30th IEEE International Performance Computing and Communications Conference  
We then suggest an improvement on the protocol to prevent the clogging attack. The other protocol we consider is a two-party identity-based authenticated key agreement protocol by Hölbl et al.  ...  In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards.  ...  We showed that the attack on this protocol could be avoided by using an additional step of exchanging numbers. The second protocol we considered is a key exchange scheme.  ... 
doi:10.1109/pccc.2011.6108113 dblp:conf/ipccc/RoyDL11 fatcat:aaxhlpnp7neyvjzckuknclgili

Photuris: Design Criteria [chapter]

William Allen Simpson
2000 Lecture Notes in Computer Science  
Historic look at design principles and requirements for a practical key management communication protocol. Refinement of terms, threat environment and limitations, and necessary features.  ...  Dynamic computational time and network round-trip time are well integrated with protocol specification. First use of anti-clogging tokens to defend against resource attacks.  ...  Photuris [KS99] was based on currently available tools, by experienced network protocol designers with an interest in cryptography, rather than by cryptographers with an interest in network protocols  ... 
doi:10.1007/3-540-46513-8_17 fatcat:rmct7h4upjbzbhtgpishvio4n4

Cryptanalysis of provably secure gateway-oriented password-based authenticated key exchange protocol

Sung-Bae Choi, Eun-Jun Yoon
2013 Applied Mathematical Sciences  
In general, a gateway-oriented password-based authenticated key exchange (GPAKE) protocol allows a client to establish an authenticated session key with a gateway via the help of an authentication server  ...  In 2013, Chien-Wu-Yeh proposed a new GPAKE protocol and then proved its security in an enhanced model.  ...  [1] first proposed a gateway-oriented password-based authenticated key exchange (GPAKE) protocol among a client, a gateway, and an authentication server, where a password was only shared between the  ... 
doi:10.12988/ams.2013.39529 fatcat:dhf2zgrwnbaejozxkwg4poov2q

Secure communication mechanisms for GSM networks

Chi-Chun Lo, Yu-Jen Chen
1999 IEEE transactions on consumer electronics  
An authentication protocol and a key gcncnltion method arc presented in conjunction with the propo.sed 'Irchitcctllt·C, Cryptanalysis and operatiollal analysis .  ...  Ihnw that the authentication protocol h .WClIfC and efficient.  ...  The X.509 Three-way Exchange (2l] The X.509 three-way exchange, described ill ITU-T Recommendations X.50C), is a novel example of a public-key based authentication protocol.  ... 
doi:10.1109/30.809184 fatcat:qgxecc3xujgfje4zaoqzgzep3y

Dynamic Key Cryptography and Applications

Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan
2010 International Journal of Network Security  
However, cryptography itself is subject to cryptanalysis attacks. To reduce the cryptanalysis attack risk, a dynamic key theory is presented and analyzed in this paper.  ...  Because these dynamic keys are one-time used symmetric cryptographic keys, they can significantly improve the security of cryptographic systems.  ...  The rest of the messages in authentication protocol is similar to traditional authentication protocols but without session key exchange.  ... 
dblp:journals/ijnsec/NgoWLWS10 fatcat:jhgpcjng3ffedkpytd7mzagt7i

A Secure and Efficient ECC-Based Anonymous Authentication Protocol

Feifei Wang, Guoai Xu, Lize Gu
2019 Security and Communication Networks  
To eliminate the security vulnerabilities of existing schemes, we propose an improved authentication scheme based on elliptic curve cryptosystem.  ...  Nowadays, remote user authentication protocol plays a great role in ensuring the security of data transmission and protecting the privacy of users for various network services.  ...  's scheme, we propose an improved anonymous authentication protocol using ECC. The proposed scheme establishes secure session key based on Diffie-Hellman key exchange.  ... 
doi:10.1155/2019/4656281 fatcat:yc5pjirmlbc5xmyajlpujk6mnm

Authentication protocols for the broadband ISDN billing system

Chi-Chun Lo, Yi-Chun Yeh
1999 Computer Standards & Interfaces  
Both protocols are designed in conjunction with a suggested key management method. Cryptanalysis shows that both the MAP and the PAP are very secure.  ...  The membership authentication protocol MAP and the personal authentication protocol PAP are proposed to support the authentication requirements of the flat rate and usage-based rate billing policies, respectively  ...  The STS protocol is another example of publickey-based authentication protocols. The STS perw x forms Diffie-Hellman 7 key exchange, followed by w x signature exchange.  ... 
doi:10.1016/s0920-5489(99)00024-0 fatcat:glyrrzoyqnaqnjaiqji6wtebbi

Cryptanalysis of Song's advanced smart card based password authentication protocol [article]

Juan E. Tapiador, Julio C. Hernandez-Castro, P. Peris-Lopez, John A. Clark
2011 arXiv   pre-print
Song Song10 proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu  ...  In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.  ...  The common adversary model to analyze the security of authentication protocols based on smart cards assumes an attacker with full control over the communication channel between the user and the server.  ... 
arXiv:1111.2744v1 fatcat:xoogfn66bbd73blz2rtnxd4vsm
« Previous Showing results 1 — 15 out of 1,854 results