Advanced Search
Volume 29 Issue 4
Jan.  2011
Turn off MathJax
Article Contents
Liu Yong-liang, Gao Wen, Yao Hong-xun, Huang Tie-jun. Security on ID-Based Key Agreement for Multimedia Encryption[J]. Journal of Electronics & Information Technology, 2007, 29(4): 892-894. doi: 10.3724/SP.J.1146.2005.01076
Citation: Liu Yong-liang, Gao Wen, Yao Hong-xun, Huang Tie-jun. Security on ID-Based Key Agreement for Multimedia Encryption[J]. Journal of Electronics & Information Technology, 2007, 29(4): 892-894. doi: 10.3724/SP.J.1146.2005.01076

Security on ID-Based Key Agreement for Multimedia Encryption

doi: 10.3724/SP.J.1146.2005.01076
  • Received Date: 2005-08-28
  • Rev Recd Date: 2006-04-06
  • Publish Date: 2007-04-19
  • Recently, Yi et al..(2002) proposed an ID-based key agreement protocol for multimedia encryption. The protocol was built on both the Diffie-Hellman key exchange protocol and the RSA public key cryptosystem. Yi et al. analyzed the security of the protocol, and understood that the protocol is robust to the malicious attacks. However, this paper shows that the protocol is vulnerable to certain malicious attacks such as forging secret information and tampering exchanging messages and analyzes the reasons that the protocol suffers these attacks. This paper points out that it may be hard to improve the protocol due to the inherent flaw of the protocol.
  • loading
  • [1] Yi X, Tan C H, and Siew C K, et al.. ID-based key agreement for multimedia encryption[J].IEEE Trans. on Consumer Electronics.2002, 48 (2):298-303 [2] Bird R.[J].Gopal I, and Herzberg A, et al.. Systematic design of two-party authentication protocols. Advances in CryptologyCRYPTO91, Santa Barbara.1991,:- [3] Diffie W, Oorschot P, and Wiener M. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 1992 2(2): 107-125. [4] Bellare M and Rogaway P. Provably secure session key distribution. Advances in CryptologyCRYPTO93, Santa Barbara, 1993: 232-249. [5] 毛文波. 现代密码学: 理论与实践. 北京: 电子工业出版社, 2004: 1-477. [6] Wilson S B and Menezes A. Authenticated Diffie-Hellman key agreement protocols. Fifth Annual Workshop on Selected Areas in Cryptography, Ontario, 1998: 339-361. [7] 卿斯汉. 安全协议20年研究进展. 软件学报, 2003, 14 (10): 1740-1752. Qing Si-han. Twenty years development of security protocols research. Journal of Software, 2003, 14 (10): 1740-1752. [8] 卿斯汉. 安全协议的设计与逻辑分析. 软件学报, 2003, 14(7): 1300-1309. Qing Si-han. Design and logical analysis of security protocols. Journal of Software, 2003, 14(7): 1300-1309. [9] 范红, 冯登国. 安全协议理论与方法. 北京: 科学出版社, 2003: 13-46. [10] Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley Sons, Inc. 1996: 246-246.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3405) PDF downloads(677) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return