DocumentCode :
2896734
Title :
Analysis of Two Authenticated Key Exchange Protocols
Author :
Cheng, Qingfeng ; Han, Guangguo ; Ma, Chuangui
Author_Institution :
Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China
Volume :
2
fYear :
2009
fDate :
18-20 Nov. 2009
Firstpage :
398
Lastpage :
400
Abstract :
The design of secure authenticated key exchange (AKE) protocols has always been a notorious hard problem. Many famous AKE protocols have been found flaws since they were finished. In this paper, we analyze two AKE protocols, which were proposed by Hassan et al. in 2007 and 2008. Then we present key compromise impersonation attack and ephemeral key compromise attack to their two AKE protocols.
Keywords :
cryptographic protocols; message authentication; authenticated key exchange protocol security; ephemeral key compromise attack; key compromise impersonation attack; Bayesian methods; Computer networks; Costs; Decision making; Game theory; Information security; Information systems; Nash equilibrium; Protection; Protocols; authenticated key exchange; ephemeral key compromise attack; key compromise impersonation attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3843-3
Electronic_ISBN :
978-1-4244-5068-8
Type :
conf
DOI :
10.1109/MINES.2009.42
Filename :
5368258
Link To Document :
بازگشت