A Note on Leakage-Resilient Authenticated Key Exchange

被引:5
作者
Chun, Ji Young [1 ]
Hwang, Jung Yeon [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, CIST, Grad Sch Informat Management & Secur, Seoul, South Korea
关键词
Password; authentication; key exchange; leakage-resilience; e-residue attack; off-line dictionary attack; RSA; EFFICIENT; NETWORKS;
D O I
10.1109/TWC.2009.080693
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly.
引用
收藏
页码:2274 / 2279
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
[Anonymous], LECT NOTES COMPUT SC
[3]  
Bach E., 1996, ALGORITHMIC NUMBER T
[4]  
BELLE J, 1970, STUD FAUNA SURINAME, V11, P1
[5]   Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks [J].
Fathi, H ;
Shin, SH ;
Kobara, K ;
Chakraborty, SS ;
Imai, H ;
Prasad, R .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (11) :2182-2193
[6]   LR-AKE-based AAA for network mobility (NEMO) over wireless links [J].
Fathi, Hanane ;
Shin, SeongHan ;
Kobara, Kazukuni ;
Chakraborty, Shyam S. ;
Imai, Hideki ;
Prasad, Ramjee .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (09) :1725-1737
[7]  
Housley R., 2001, Planning for PKI: best practices guide for deploying public key infrastructure
[8]  
Ostrovsky R., 1991, Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, P51, DOI 10.1145/112600.112605
[9]  
Park S, 2007, LECT NOTES COMPUT SC, V4377, P309
[10]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613