Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

Hyun Seok Kim, Seok Seo, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of- initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.

Original languageEnglish
Title of host publicationProceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
Pages1015-1018
Number of pages4
DOIs
Publication statusPublished - 2008
Event10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008 - Dalian, China
Duration: 2008 Sep 252008 Sep 27

Publication series

NameProceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008

Other

Other10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
CountryChina
CityDalian
Period08/9/2508/9/27

Keywords

  • Impersonation attack
  • Key exchange
  • Three party key agreement

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Weaknesses analysis and countermeasure of a verifier-based key agreement protocol'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., Seo, S., & Choi, J. Y. (2008). Weaknesses analysis and countermeasure of a verifier-based key agreement protocol. In Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008 (pp. 1015-1018). [4637818] (Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008). https://doi.org/10.1109/HPCC.2008.31