Skip to main content

The Risks of Compromising Secret Information

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

This paper presents a taxonomy of known-key attacks on athenticated key agreement protocols, which is based on the adversaries’ roles and objectives. The taxonomy is illustrated using new attacks on the Just-Vaudenay and Yacobi protocol. The taxonomy is used to discuss countermeasures and protocol analysis methods against known-key attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson and R. Needham, Robustness Principles for Public Key Protocols, Advances in Cryptology, Crypto’ 95, LNCS 963, Springer-Verlag, pp. 236–247, 1995.

    Google Scholar 

  2. R. Bird, I. Gopal, P. A. Janson, S. Kutten, R. Mulva, and M. Yung, Systemetic design of two-party authentication protocols, Proc. of Crypto’91: Advaced in cryptology LNCS 576, Springer-Verlag, pp. 44–61, 1991.

    Google Scholar 

  3. S. Blake-Wilson and A. Menezes, Authenticated Diffie-Hellman key agreement protocols, Proc. of the 5th Annual Workshop on Selected Areas in Cryptography (SAC’98), LNCS 1556, Springer-Verlag, pp. 339–361, 1999.

    Chapter  Google Scholar 

  4. M. Bumester, On the risk of opening distributed keys, Advances in Cryptology, Crypto’94, LNCS 839, pp. 308–317, 1994.

    Google Scholar 

  5. D. Denning, and G. Sacco, ‘Timestamps in key distribution systems’, Communications of the ACM, 24(8), pp. 533–536, 1981.

    Article  Google Scholar 

  6. Y. Desmedt and M. Bumester, Towards practical ‘proven secure’ authenticated key distribution, ist ACM Conference on Computer and Communications security, ACM press, pp. 228–231, 1993.

    Google Scholar 

  7. W. Diffe, P. van Oorschot and M. Wiener, Authentication and authenticated key exchange, Designs, Codes and Cryptography, 2, pp. 107–125, 1992.

    Article  Google Scholar 

  8. K. C. Goss, Cryptographic method and apparatus for public key exchanges with authentication, U. S Patent # 4,956,863, 11, Sep., 1990.

    Google Scholar 

  9. M. Just and S. Vaudenay, Authenticated multi-party key agreement, Advances in Cryptology, Asiacrypt’96, LNCS 537, pp., 19.

    Google Scholar 

  10. B. Kaliski, Contribution to ANSI X9F1 and IEEE P1363 working groups, June, 1998.

    Google Scholar 

  11. L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, An efficient protocol for authenticated key agreement, Technical report CORR 98-05, University of Waterloo, 1998.

    Google Scholar 

  12. C. Lim and P. Lee, A key recovery attack on discret log-based schemes using a prime order subgroup, Advaced in cryptology, Crypto97’, LNCS 1294, Springer-Verlag, pp. 249–263.

    Chapter  Google Scholar 

  13. T, Mastumoto, Y. Takashima, and H. Imai, On seeking smart public-key distribution systems, IEICE TRANS. FUNDAMENTALS, Vol. E69 pp. 99–106, 1986.

    Google Scholar 

  14. A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied cryptology, CRC Press, 1997.

    Google Scholar 

  15. B. Song and K. Kim, Two-pass authenticated key agreemnet protocol with key confirmation, Progress in Cryptology, Indocrypto’00, LNCS 1977, pp. 237–249, 2000.

    Google Scholar 

  16. Y. Yacobi, A Key distribution “paradox”, Advances in Cryptology, Crypto’89, LNCS 537, pp. 268–273, 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shim, K. (2002). The Risks of Compromising Secret Information. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics