Title :
Analysis of Two Authenticated Key Exchange Protocols
Author :
Cheng, Qingfeng ; Han, Guangguo ; Ma, Chuangui
Author_Institution :
Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China
Abstract :
The design of secure authenticated key exchange (AKE) protocols has always been a notorious hard problem. Many famous AKE protocols have been found flaws since they were finished. In this paper, we analyze two AKE protocols, which were proposed by Hassan et al. in 2007 and 2008. Then we present key compromise impersonation attack and ephemeral key compromise attack to their two AKE protocols.
Keywords :
cryptographic protocols; message authentication; authenticated key exchange protocol security; ephemeral key compromise attack; key compromise impersonation attack; Bayesian methods; Computer networks; Costs; Decision making; Game theory; Information security; Information systems; Nash equilibrium; Protection; Protocols; authenticated key exchange; ephemeral key compromise attack; key compromise impersonation attack;
Conference_Titel :
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3843-3
Electronic_ISBN :
978-1-4244-5068-8
DOI :
10.1109/MINES.2009.42