Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

Hyun Seok Kim, Seok Seo, Jin Young Choi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of- initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.

    Original languageEnglish
    Title of host publicationProceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
    Pages1015-1018
    Number of pages4
    DOIs
    Publication statusPublished - 2008
    Event10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008 - Dalian, China
    Duration: 2008 Sept 252008 Sept 27

    Publication series

    NameProceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008

    Other

    Other10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
    Country/TerritoryChina
    CityDalian
    Period08/9/2508/9/27

    Keywords

    • Impersonation attack
    • Key exchange
    • Three party key agreement

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Computer Science Applications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Weaknesses analysis and countermeasure of a verifier-based key agreement protocol'. Together they form a unique fingerprint.

    Cite this