A note on leakage-resilient authenticated key exchange

Ji Young Chun, Jung Yeon Hwang, Dong Hoon Lee

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly.

Original languageEnglish
Pages (from-to)2274-2279
Number of pages6
JournalIEEE Transactions on Wireless Communications
Volume8
Issue number5
DOIs
Publication statusPublished - 2009 May 1

Fingerprint

Authenticated Key Exchange
Leakage
Hash functions
Hash Function
Network protocols
RSA Cryptosystem
Client/server
Cryptography
Telecommunication links
Servers
Defects

Keywords

  • Authentication
  • E-residue attack
  • Key exchange
  • Leakage-resilience
  • Off-line dictionary attack
  • Password

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Applied Mathematics

Cite this

A note on leakage-resilient authenticated key exchange. / Chun, Ji Young; Hwang, Jung Yeon; Lee, Dong Hoon.

In: IEEE Transactions on Wireless Communications, Vol. 8, No. 5, 01.05.2009, p. 2274-2279.

Research output: Contribution to journalArticle

Chun, Ji Young ; Hwang, Jung Yeon ; Lee, Dong Hoon. / A note on leakage-resilient authenticated key exchange. In: IEEE Transactions on Wireless Communications. 2009 ; Vol. 8, No. 5. pp. 2274-2279.
@article{58aab812229a464892681d401b748b4f,
title = "A note on leakage-resilient authenticated key exchange",
abstract = "Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly.",
keywords = "Authentication, E-residue attack, Key exchange, Leakage-resilience, Off-line dictionary attack, Password",
author = "Chun, {Ji Young} and Hwang, {Jung Yeon} and Lee, {Dong Hoon}",
year = "2009",
month = "5",
day = "1",
doi = "10.1109/TWC.2009.080693",
language = "English",
volume = "8",
pages = "2274--2279",
journal = "IEEE Transactions on Wireless Communications",
issn = "1536-1276",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "5",

}

TY - JOUR

T1 - A note on leakage-resilient authenticated key exchange

AU - Chun, Ji Young

AU - Hwang, Jung Yeon

AU - Lee, Dong Hoon

PY - 2009/5/1

Y1 - 2009/5/1

N2 - Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly.

AB - Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly.

KW - Authentication

KW - E-residue attack

KW - Key exchange

KW - Leakage-resilience

KW - Off-line dictionary attack

KW - Password

UR - http://www.scopus.com/inward/record.url?scp=77955719586&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77955719586&partnerID=8YFLogxK

U2 - 10.1109/TWC.2009.080693

DO - 10.1109/TWC.2009.080693

M3 - Article

AN - SCOPUS:77955719586

VL - 8

SP - 2274

EP - 2279

JO - IEEE Transactions on Wireless Communications

JF - IEEE Transactions on Wireless Communications

SN - 1536-1276

IS - 5

ER -