Cryptanalysis of a secure and efficient three-pass authenticated key agreement protocol based on elliptic curves

Zeyad Mohammad, Chien Lung Hsu*, Yaw Chung Chen, Chi Chun Lo

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

12 Scopus citations

Abstract

Key agreement protocols are a foundation for distributing a common secret key over an insecure network. Lim et al. proposed a secure and efficient three-pass authenticated key agreement protocol based on elliptic curves to overcome the vulnerability of Yoon-Yoo protocol under extended Canetti-Krawczyk security model. In this letter, we show that Lim et al.'s protocol is vulnerable to leakage of responder's static private key by malicious party and cannot withstand known key security resilience attacks.

Original languageEnglish
Pages (from-to)247-250
Number of pages4
JournalJournal of Internet Technology
Volume14
Issue number2
DOIs
StatePublished - 2013

Keywords

  • Cryptanalysis
  • Extended canetti-krawczyk
  • Key agreement
  • Know key security
  • Static private key leakage

Fingerprint

Dive into the research topics of 'Cryptanalysis of a secure and efficient three-pass authenticated key agreement protocol based on elliptic curves'. Together they form a unique fingerprint.

Cite this