Abstract
This paper presents a taxonomy of known-key attacks on athenticated key agreement protocols, which is based on the adversaries’ roles and objectives. The taxonomy is illustrated using new attacks on the Just-Vaudenay and Yacobi protocol. The taxonomy is used to discuss countermeasures and protocol analysis methods against known-key attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson and R. Needham, Robustness Principles for Public Key Protocols, Advances in Cryptology, Crypto’ 95, LNCS 963, Springer-Verlag, pp. 236–247, 1995.
R. Bird, I. Gopal, P. A. Janson, S. Kutten, R. Mulva, and M. Yung, Systemetic design of two-party authentication protocols, Proc. of Crypto’91: Advaced in cryptology LNCS 576, Springer-Verlag, pp. 44–61, 1991.
S. Blake-Wilson and A. Menezes, Authenticated Diffie-Hellman key agreement protocols, Proc. of the 5th Annual Workshop on Selected Areas in Cryptography (SAC’98), LNCS 1556, Springer-Verlag, pp. 339–361, 1999.
M. Bumester, On the risk of opening distributed keys, Advances in Cryptology, Crypto’94, LNCS 839, pp. 308–317, 1994.
D. Denning, and G. Sacco, ‘Timestamps in key distribution systems’, Communications of the ACM, 24(8), pp. 533–536, 1981.
Y. Desmedt and M. Bumester, Towards practical ‘proven secure’ authenticated key distribution, ist ACM Conference on Computer and Communications security, ACM press, pp. 228–231, 1993.
W. Diffe, P. van Oorschot and M. Wiener, Authentication and authenticated key exchange, Designs, Codes and Cryptography, 2, pp. 107–125, 1992.
K. C. Goss, Cryptographic method and apparatus for public key exchanges with authentication, U. S Patent # 4,956,863, 11, Sep., 1990.
M. Just and S. Vaudenay, Authenticated multi-party key agreement, Advances in Cryptology, Asiacrypt’96, LNCS 537, pp., 19.
B. Kaliski, Contribution to ANSI X9F1 and IEEE P1363 working groups, June, 1998.
L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, An efficient protocol for authenticated key agreement, Technical report CORR 98-05, University of Waterloo, 1998.
C. Lim and P. Lee, A key recovery attack on discret log-based schemes using a prime order subgroup, Advaced in cryptology, Crypto97’, LNCS 1294, Springer-Verlag, pp. 249–263.
T, Mastumoto, Y. Takashima, and H. Imai, On seeking smart public-key distribution systems, IEICE TRANS. FUNDAMENTALS, Vol. E69 pp. 99–106, 1986.
A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied cryptology, CRC Press, 1997.
B. Song and K. Kim, Two-pass authenticated key agreemnet protocol with key confirmation, Progress in Cryptology, Indocrypto’00, LNCS 1977, pp. 237–249, 2000.
Y. Yacobi, A Key distribution “paradox”, Advances in Cryptology, Crypto’89, LNCS 537, pp. 268–273, 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shim, K. (2002). The Risks of Compromising Secret Information. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_11
Download citation
DOI: https://doi.org/10.1007/3-540-36159-6_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00164-5
Online ISBN: 978-3-540-36159-6
eBook Packages: Springer Book Archive