Abstract
Recently, Jung [1] proposed an efficient group key agreement protocol over authenticated channel. In this letter, we present a critique of the protocol. In particular, we show that Jung's protocol is vulnerable to attacks of malicious insiders.
Original language | English |
---|---|
Pages (from-to) | 638-639 |
Number of pages | 2 |
Journal | IEEE Communications Letters |
Volume | 10 |
Issue number | 8 |
DOIs | |
Publication status | Published - 2006 Aug |
Bibliographical note
Funding Information:Manuscript received March 9, 2006. The associate editor coordinating the review of this letter and approving it for publication was Dr. Nikos Nikolaou. This work was supported by grant No.R01-2004-000-10704-0 from the Korea Science and Engineering Foundation. The authors are with the Graduate School of Information Security, CIST, Korea University, Seoul, Korea (email: [email protected]). Digital Object Identifier 10.1109/LCOMM.2006.060346.
Keywords
- Conference key
- Fault tolerance
- Malicious insider
ASJC Scopus subject areas
- Modelling and Simulation
- Computer Science Applications
- Electrical and Electronic Engineering