Open Access
Subscription Access
Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Abstract
Key agreement protocols are a foundation for distributing a common secret key over an insecure network. Lim et al. proposed a secure and efficient three-pass authenticated key agreement protocol based on elliptic curves to overcome the vulnerability of Yoon-Yoo protocol under extended Canetti-Krawczyk security model. In this letter, we show that Lim et al.'s protocol is vulnerable to leakage of responder's static private key by malicious party and cannot withstand known key security resilience attacks.
Keywords
Cryptanalysis; Key agreement; Know key security; Extended Canetti-Krawczyk; Static private key leakage
Citation Format:
Zeyad Mohammad, Chien-Lung Hsu, Yaw-Chung Chen, Chi-Chun Lo, "Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves," Journal of Internet Technology, vol. 14, no. 2 , pp. 247-250, Mar. 2013.
Zeyad Mohammad, Chien-Lung Hsu, Yaw-Chung Chen, Chi-Chun Lo, "Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves," Journal of Internet Technology, vol. 14, no. 2 , pp. 247-250, Mar. 2013.
Full Text:
PDFRefbacks
- There are currently no refbacks.
Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314 E-mail: jit.editorial@gmail.com