On the security of an efficient two-pass key agreement protocol

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), but its two-pass form is vulnerable to an unknown key-share attack. Recently, Lee et al. proposed an efficient two-pass key agreement protocol to withstand the unknown key-share attack. However, this article shows that their protocol is vulnerable to a key-compromise impersonation attack.

Original languageEnglish
Pages (from-to)371-374
Number of pages4
JournalComputer Standards and Interfaces
Volume26
Issue number4
DOIs
Publication statusPublished - 2004 Aug 1

Fingerprint

compromise

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Law

Cite this

@article{b6814080bce84b2693ba4e99fa21e730,
title = "On the security of an efficient two-pass key agreement protocol",
abstract = "The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), but its two-pass form is vulnerable to an unknown key-share attack. Recently, Lee et al. proposed an efficient two-pass key agreement protocol to withstand the unknown key-share attack. However, this article shows that their protocol is vulnerable to a key-compromise impersonation attack.",
author = "Yuh-Min Tseng",
year = "2004",
month = "8",
day = "1",
doi = "10.1016/j.csi.2003.11.007",
language = "English",
volume = "26",
pages = "371--374",
journal = "Computer Standards and Interfaces",
issn = "0920-5489",
publisher = "Elsevier",
number = "4",

}

On the security of an efficient two-pass key agreement protocol. / Tseng, Yuh-Min.

In: Computer Standards and Interfaces, Vol. 26, No. 4, 01.08.2004, p. 371-374.

Research output: Contribution to journalArticle

TY - JOUR

T1 - On the security of an efficient two-pass key agreement protocol

AU - Tseng, Yuh-Min

PY - 2004/8/1

Y1 - 2004/8/1

N2 - The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), but its two-pass form is vulnerable to an unknown key-share attack. Recently, Lee et al. proposed an efficient two-pass key agreement protocol to withstand the unknown key-share attack. However, this article shows that their protocol is vulnerable to a key-compromise impersonation attack.

AB - The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), but its two-pass form is vulnerable to an unknown key-share attack. Recently, Lee et al. proposed an efficient two-pass key agreement protocol to withstand the unknown key-share attack. However, this article shows that their protocol is vulnerable to a key-compromise impersonation attack.

UR - http://www.scopus.com/inward/record.url?scp=2042471479&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=2042471479&partnerID=8YFLogxK

U2 - 10.1016/j.csi.2003.11.007

DO - 10.1016/j.csi.2003.11.007

M3 - Article

AN - SCOPUS:2042471479

VL - 26

SP - 371

EP - 374

JO - Computer Standards and Interfaces

JF - Computer Standards and Interfaces

SN - 0920-5489

IS - 4

ER -