Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications

  • Alberto PeinadoEmail author
  • Andrés Ortiz
  • Guillermo Cotrina
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 239)


Recently, Antequera and López-Ramos have proposed an improvement on the secure multicast protocol based on the extended Euclidean algorithm in order to overcome the weaknesses and breaches detected by Peinado and Ortiz. The improvement defines a new authentication scheme based on the Chinese Remainder Theorem. However, we show in this work that the protocol is still vulnerable to impersonation attack due to the relationships between the authentication message of different multicast keys.


Cryptanalysis Key refreshment Key Distribution Multicast 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Applications of the Extended Euclidean Algorithm to Privacy and Secure Communications. In: Proc. of 10th International Conference on Computational and Mathematical Methods in Science and Engineering (2010)Google Scholar
  2. 2.
    Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Key Refreshment in overlay networks: a centralized secure multicast scheme proposal. In: XXI Jornadas de Paralelismo, Valencia, Spain, pp. 931–938 (2010)Google Scholar
  3. 3.
    Naranjo, J.Á.M., Ramos, J.A.L., Casado, L.G.: A Key Distribution scheme for Live Streaming Multi-tree Overlays. In: Herrero, Á., Corchado, E., Redondo, C., Alonso, Á. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol. 85, pp. 223–230. Springer, Heidelberg (2010)Google Scholar
  4. 4.
    Menezes, A., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press (1996)Google Scholar
  5. 5.
    Peinado, A., Ortiz, A.: Cryptanalysis of Multicast protocols with Key Refreshment based on the Extended Euclidean Algorithm. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 177–182. Springer, Heidelberg (2011)Google Scholar
  6. 6.
    Peinado, A., Ortiz, A.: Cryptanalysis of a Key Refreshment Scheme for Multicast protocols by means of Genetic Algorithm. Logic Journal of the IGPL (August 2012), doi:10.1093/jigpal/jzs031Google Scholar
  7. 7.
    Antequera, N., López-Ramos, J.A.: Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proc. 7th International Conference on Next Generation Web Services Practices, pp. 210–214 (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Alberto Peinado
    • 1
    Email author
  • Andrés Ortiz
    • 1
  • Guillermo Cotrina
    • 1
  1. 1.Dept. Ingeniería de Comunicaciones, E.T.S.I. TelecomunicaciónUniversidad de MálagaMálagaSpain

Personalised recommendations