Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm

  • Alberto Peinado
  • Andrés Ortiz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6694)


Recently, Naranjo, López-Ramos and Casado have proposed a key refreshment for multicast schemes based on the extended Euclidean algorithm. We show in this paper that the key refreshment is not secure, describing several weaknesses and the algorithm to obtain the private key of any user. Hence, every system in which the key refreshment is applied will be compromised.


Cryptanalysis Key refreshment Key Distribution Multicast 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Applications of the Extended Euclidean Algorithm to Privacy and Secure Communications. In: Proc. of 10th International Conference on Computational and Mathematical Methods in Science and Engineering (2010)Google Scholar
  2. 2.
    Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Key Refreshment in overlay networks: a centralized secure multicast scheme proposal. In: XXI Jornadas de Paralelismo, Valencia, Spain, pp. 931–938 (2010)Google Scholar
  3. 3.
    Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: A Key Distribution scheme for Live Streaming Multi-tree Overlays. In: 3rd International Conference on Computational Intelligence in Security for Information Systems, CISIS 2010, pp. 223–230 (2010), doi:10.1007/978-3-642-16626-6-24Google Scholar
  4. 4.
    Menezes, A., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Alberto Peinado
    • 1
  • Andrés Ortiz
    • 1
  1. 1.Dept. Ingeniería de Comunicaciones, E.T.S.I. TelecomunicaciónUniversidad de MálagaMálagaSpain

Personalised recommendations