Title :
Impersonation Attack on Two Identity-Based Authenticated Key Exchange Protocols
Author :
Zhang, Shiwu ; Cheng, Qingfeng ; Wang, Xuekui
Author_Institution :
Luoyang Univ. of Foreign Languages, Luoyang, China
Abstract :
In 2009, Holbl et al. proposed two new identity-based authenticated key exchange protocols and claimed that their protocols can withstand various attacks. In this paper, we will show that Holbl et al.´s protocols cannot resist basic impersonation attack. It also means that their protocols are vulnerable to key compromise impersonation (KCI) attacks. Furthermore, we propose improvements of their protocols with impersonation attack resilience and KCI resilience.
Keywords :
message authentication; protocols; impersonation attack resilience; key compromise impersonation attacks; two identity-based authenticated key exchange protocols; Book reviews; Protocols; Public key; Resilience; Resists; authenticated key exchange; identity-based; impersonation attack;
Conference_Titel :
Information Engineering (ICIE), 2010 WASE International Conference on
Conference_Location :
Beidaihe, Hebei
Print_ISBN :
978-1-4244-7506-3
Electronic_ISBN :
978-1-4244-7507-0
DOI :
10.1109/ICIE.2010.122