DocumentCode :
1611510
Title :
Challenge-Response Attack on a Key Transport Protocol based on a Ring Locking Technique
Author :
Jia-qi, Li ; Jun, Yang
Author_Institution :
Coll. of Comput. Sci. & Technol., Southwest Univ. for Nat., Chengdu, China
fYear :
2012
Firstpage :
704
Lastpage :
708
Abstract :
Key transport is one of the fundamental issues in modern cryptography. Recently Khayat proposed a multiple agent distributed version of Shamir´s 3-pass no-key protocol. In this paper, based on a ring locking technique a challenge-response attack on Khayat´s protocol is mounted to capture its vulnerability to CCA1 and CCA2. The cryptanalysis shows that the attack protocol is efficient (without expensive on-line computation of modular inverses), scalable (independent of the size of trustees), and feasible on the Internet environment. One of its novel features is that the active attacker can conceal some trace of his cyber crime by means of the commutative property of index multiplication in iterative modular exponentiations.
Keywords :
Internet; computer crime; computer network security; cryptography; multi-agent systems; transport protocols; CCA1; CCA2; Internet environment; Khayat protocol; Shamir 3-pass no-key protocol; active attacker; attack protocol; challenge-response attack; cryptanalysis; cyber crime; index multiplication commutative property; iterative modular exponentiations; key transport protocol; modern cryptography; multiple agent distributed version; ring locking technique; Industrial control; Challenge-response; Chosen ciphertext attack (CCA); Commutative property; Cryptanalysis; Key transport protocol; Ring locking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-4673-1450-3
Type :
conf
DOI :
10.1109/ICICEE.2012.190
Filename :
6322479
Link To Document :
بازگشت