Title :
Cryptanalysis of a Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography
Author :
Pu, Qiong ; Zhao, Xiuying ; Ding, Jianmin
Author_Institution :
Dept. of Electron., Inf. Eng. Univ., Zhengzhou, China
Abstract :
Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve cryptography for mobile-commerce environments. In this paper, we demonstrate that Yang et al´s three-party authenticated protocol is potentially vulnerable to an unknown key-share attack. Thereafter, we suggest a countermeasure to resist our described attacks while the merits of the original protocol are left unchanged. On the other hand, through this work, we also highlight that the existence of insider attacks needs to be taken into consideration in the three-party setting.
Keywords :
cryptographic protocols; public key cryptography; cryptanalysis; elliptic curve cryptography; mobile commerce environment; three party authenticated key exchange protocol; unknown key share attack; Authentication; Computer science; Context; Cryptographic protocols; Elliptic curve cryptography; Large-scale systems; Mobile communication; Network servers; Resists; Security; elliptic curve cryptography; three-party authenticated key exchange; unknown key-share attack;
Conference_Titel :
Research Challenges in Computer Science, 2009. ICRCCS '09. International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3927-0
Electronic_ISBN :
978-1-4244-5410-5
DOI :
10.1109/ICRCCS.2009.11