Title :
Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol
Author :
Kim, Hyun-Seok ; Seo, Seok ; Choi, Jin-Young
Author_Institution :
Dept. of Electron. Eng. & Inf. Sci., Korea Mil. Acad., Seoul
Abstract :
In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server´s public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server´s public key. However, we find that the protocol is susceptible to an impersonation-of-initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.
Keywords :
cryptographic protocols; message authentication; impersonation-of-initiator attack; impersonation-of-responder attack; verifier-based key agreement protocol; Authentication; Electronic countermeasures; High performance computing; Information analysis; Information science; Intrusion detection; Military computing; Performance analysis; Protocols; Public key; Impersonation attack; Key exchange; Three party key agreement;
Conference_Titel :
High Performance Computing and Communications, 2008. HPCC '08. 10th IEEE International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-0-7695-3352-0
DOI :
10.1109/HPCC.2008.31