Advanced Search
Volume 35 Issue 9
Sep.  2013
Turn off MathJax
Article Contents
Hu Xue-Xian, Wei Jiang-Hong, Ye Mao. Cryptanalysis of a Strongly Secure Authenticated Key Exchange Protocol[J]. Journal of Electronics & Information Technology, 2013, 35(9): 2278-2282. doi: 10.3724/SP.J.1146.2012.01380
Citation: Hu Xue-Xian, Wei Jiang-Hong, Ye Mao. Cryptanalysis of a Strongly Secure Authenticated Key Exchange Protocol[J]. Journal of Electronics & Information Technology, 2013, 35(9): 2278-2282. doi: 10.3724/SP.J.1146.2012.01380

Cryptanalysis of a Strongly Secure Authenticated Key Exchange Protocol

doi: 10.3724/SP.J.1146.2012.01380
  • Received Date: 2012-10-26
  • Rev Recd Date: 2013-05-30
  • Publish Date: 2013-09-19
  • In the 15th (2012) IACR international conference on practice and theory of Public-Key Cryptography (PKC), Fujioka et al. proposed a generic construction of Authenticated Key Exchange (AKE) from a Key Encapsulation Mechanism (KEM), which is called the GC protocol and is proven to be secure in the CK+ security model. In this paper, it is pointed out by cryptanalysis that the GC protocol is not CK+ secure. Concrete attacks in which the outside adversary, without knowing the static or ephemeral keys of the users, imitates a valid user are also given. Further, the errors in the original security proof are analyzed.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2944) PDF downloads(1522) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return