Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols

Junghyun Nam, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages1-9
Number of pages9
Volume3786 LNCS
Publication statusPublished - 2005 Dec 1
Externally publishedYes
Event6th International Workshop on Information Security Applications, WISA 2005 - Jeju Island, Korea, Republic of
Duration: 2005 Aug 222005 Aug 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3786 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other6th International Workshop on Information Security Applications, WISA 2005
CountryKorea, Republic of
CityJeju Island
Period05/8/2205/8/24

Fingerprint

Group Key Agreement
Defects
Key Agreement Protocol
Vulnerability
Attack

Keywords

  • Collusion attack
  • Group key agreement
  • Key authentication

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Nam, J., Kim, S-J., & Won, D. (2005). Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3786 LNCS, pp. 1-9). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3786 LNCS).

Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols. / Nam, Junghyun; Kim, Seung-Joo; Won, Dongho.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3786 LNCS 2005. p. 1-9 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nam, J, Kim, S-J & Won, D 2005, Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3786 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3786 LNCS, pp. 1-9, 6th International Workshop on Information Security Applications, WISA 2005, Jeju Island, Korea, Republic of, 05/8/22.
Nam J, Kim S-J, Won D. Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3786 LNCS. 2005. p. 1-9. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Nam, Junghyun ; Kim, Seung-Joo ; Won, Dongho. / Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3786 LNCS 2005. pp. 1-9 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{4dfef282c1d64d328352ecd0cbe21738,
title = "Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols",
abstract = "A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.",
keywords = "Collusion attack, Group key agreement, Key authentication",
author = "Junghyun Nam and Seung-Joo Kim and Dongho Won",
year = "2005",
month = "12",
day = "1",
language = "English",
isbn = "3540310126",
volume = "3786 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "1--9",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols

AU - Nam, Junghyun

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2005/12/1

Y1 - 2005/12/1

N2 - A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.

AB - A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.

KW - Collusion attack

KW - Group key agreement

KW - Key authentication

UR - http://www.scopus.com/inward/record.url?scp=33744905352&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33744905352&partnerID=8YFLogxK

M3 - Conference contribution

SN - 3540310126

SN - 9783540310129

VL - 3786 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 1

EP - 9

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -