On the (Non)Improvement of an Authenticated GKT Protocol

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 369)

Abstract

Harn and Lin proposed in 2010 a secret sharing-based group key transfer protocol. One year later, Nam et al. showed their construction is vulnerable to a replay attack and proposed a way to fix it. Recently, Yuan et al. analyzed the same protocol, proved that it is also vulnerable to a man-in-the middle attack and considered a countermeasure. First, we slightly modify Yuan et al.’s attack to make it simpler to implement and harder to be detected. Second, we show that the improved version of the protocol remains susceptible to a man-in-the-middle attack.

Keywords

Group key transfer Secret sharing Man-in-the-middle attack Insider attack Cryptanalysis 

References

  1. 1.
    Harn, L., Lin, C.: Authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 59(6), 842–846 (2010)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Kim, M., Park, N., Won, D.: Cryptanalysis of an authenticated group key transfer protocol based on secret sharing. In: Park, J.J(Jong Hyuk), Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 761–766. Springer, Heidelberg (2013)Google Scholar
  3. 3.
    Nam, J., Kim, M., Paik, J., Jeon, W., Lee, B., Won, D.: Cryptanalysis of a group key transfer protocol based on secret sharing. In: Kim, T., Adeli, H., Slezak, D., Sandnes, F.E., Song, X., Chung, K., Arnett, K.P. (eds.) FGIT 2011. LNCS, vol. 7105, pp. 309–315. Springer, Heidelberg (2011)Google Scholar
  4. 4.
    Olimid, R.F.: On the security of an authenticated group key transfer protocol based on secret sharing. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 399–408. Springer, Heidelberg (2013)Google Scholar
  5. 5.
    Olimid, R.F.: A chain of attacks and countermeasures applied to a group key transfer protocol. In: Proceedings of International Joint Conference SOCO13 CISIS13 ICEUTE13, AISC 239, pp. 333–342, (2014)Google Scholar
  6. 6.
    Rivest, R., Shamir, A.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)CrossRefMATHMathSciNetGoogle Scholar
  7. 7.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)CrossRefMATHMathSciNetGoogle Scholar
  8. 8.
    Sun, Y., Wen, Q., Sun, H., Li, W., Jin, Z., Zhang, H.: An authenticated group key transfer protocol based on secret sharing. Int. Workshop Inform. Electron. Eng. Procedia Eng. 29, 403–408 (2012)Google Scholar
  9. 9.
    Yuan, W., Hu, L., Li, H., Chu, J.: Security and improvement of an authenticated group key transfer protocol based on secret sharing. Appl. Math. Inf. Sci. 7(5), 1943–1949 (2013)CrossRefMathSciNetGoogle Scholar
  10. 10.
    Yuan, W., Hu, L., Li, H., Chu, J.: An effcient password-based group key exchange protocol using secret sharing. Appl. Math. Inf. Sci 7(1), 145–150 (2013)CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of BucharestBucharestRomania

Personalised recommendations