Security weakness in a provable secure authentication protocol given forward secure session key

Mijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Shi, Jang and Yoo recently proposed a provable secure key distribution and authentication protocol between user, service provider and key distribution center(KDC). The protocol was based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. Despite the claim of provable security, the protocol is in fact insecure in the presence of an active adversary. In this paper, we present the imperfection of Shi et al.'s protocol and suggest modifications to the protocol which would resolve the problem.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings
Pages204-211
Number of pages8
EditionPART 2
DOIs
Publication statusPublished - 2009
EventInternational Conference on Computational Science and Its Applications, ICCSA 2009 - Seoul, Korea, Republic of
Duration: 2009 Jun 292009 Jul 2

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume5593 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Computational Science and Its Applications, ICCSA 2009
CountryKorea, Republic of
CitySeoul
Period09/6/2909/7/2

Keywords

  • Authentication
  • Cryptography
  • Key distribution
  • Known key attack
  • Provable security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Security weakness in a provable secure authentication protocol given forward secure session key'. Together they form a unique fingerprint.

  • Cite this

    Kim, M., Jo, H., Kim, S., & Won, D. (2009). Security weakness in a provable secure authentication protocol given forward secure session key. In Computational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings (PART 2 ed., pp. 204-211). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5593 LNCS, No. PART 2). https://doi.org/10.1007/978-3-642-02457-3_18