Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

Hyun Seok Kim, Seok Seo, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of- initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.

Original languageEnglish
Title of host publicationProceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
Pages1015-1018
Number of pages4
DOIs
Publication statusPublished - 2008 Nov 24
Event10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008 - Dalian, China
Duration: 2008 Sep 252008 Sep 27

Other

Other10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
CountryChina
CityDalian
Period08/9/2508/9/27

Fingerprint

Network protocols
Servers

Keywords

  • Impersonation attack
  • Key exchange
  • Three party key agreement

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

Kim, H. S., Seo, S., & Choi, J. Y. (2008). Weaknesses analysis and countermeasure of a verifier-based key agreement protocol. In Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008 (pp. 1015-1018). [4637818] https://doi.org/10.1109/HPCC.2008.31

Weaknesses analysis and countermeasure of a verifier-based key agreement protocol. / Kim, Hyun Seok; Seo, Seok; Choi, Jin Young.

Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008. 2008. p. 1015-1018 4637818.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, HS, Seo, S & Choi, JY 2008, Weaknesses analysis and countermeasure of a verifier-based key agreement protocol. in Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008., 4637818, pp. 1015-1018, 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, Dalian, China, 08/9/25. https://doi.org/10.1109/HPCC.2008.31
Kim HS, Seo S, Choi JY. Weaknesses analysis and countermeasure of a verifier-based key agreement protocol. In Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008. 2008. p. 1015-1018. 4637818 https://doi.org/10.1109/HPCC.2008.31
Kim, Hyun Seok ; Seo, Seok ; Choi, Jin Young. / Weaknesses analysis and countermeasure of a verifier-based key agreement protocol. Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008. 2008. pp. 1015-1018
@inproceedings{6cc64cd2cd4744f9873507957be4d942,
title = "Weaknesses analysis and countermeasure of a verifier-based key agreement protocol",
abstract = "In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of- initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.",
keywords = "Impersonation attack, Key exchange, Three party key agreement",
author = "Kim, {Hyun Seok} and Seok Seo and Choi, {Jin Young}",
year = "2008",
month = "11",
day = "24",
doi = "10.1109/HPCC.2008.31",
language = "English",
isbn = "9780769533520",
pages = "1015--1018",
booktitle = "Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008",

}

TY - GEN

T1 - Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

AU - Kim, Hyun Seok

AU - Seo, Seok

AU - Choi, Jin Young

PY - 2008/11/24

Y1 - 2008/11/24

N2 - In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of- initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.

AB - In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of- initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.

KW - Impersonation attack

KW - Key exchange

KW - Three party key agreement

UR - http://www.scopus.com/inward/record.url?scp=56349154626&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=56349154626&partnerID=8YFLogxK

U2 - 10.1109/HPCC.2008.31

DO - 10.1109/HPCC.2008.31

M3 - Conference contribution

AN - SCOPUS:56349154626

SN - 9780769533520

SP - 1015

EP - 1018

BT - Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008

ER -