Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancement

Zeyad Mohammad, Chi-Chun Lo

研究成果同行評審

8 引文 斯高帕斯(Scopus)

摘要

Authenticated key agreement protocols are a foundation for delivering an authenticated session key between the intended two-party participants from a set of parties over an insecure network. Wang et al proposed protocol ECKE-1N to overcome KCI-R attacks in ECKE-1 as an implicit authenticated key agreement protocol based on Diffie-Hellman elliptic curve. In this paper, we show that ECKE-1N is vulnerable to both leakage of ephemeral private keys and KCI-R attacks. We present an enhanced protocol EECKE-1N, which can withstand KCI-R attacks and revelations both of ephemeral keys. Furthermore, EECKE-1N can provide desirable security proprieties.
原文English
頁面 128-132
頁數5
DOIs
出版狀態Published - 5月 2009
事件1st International Conference on E-Business and Information System Security - Wuhan, 中國
持續時間: 23 5月 200924 5月 2009

Conference

Conference1st International Conference on E-Business and Information System Security
國家/地區中國
城市Wuhan
期間23/05/0924/05/09

指紋

深入研究「Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancement」主題。共同形成了獨特的指紋。

引用此