M. Ceria, Alessandro De Piccoli, Theo Moriarty, Andrea Visconti
{"title":"A troyan Diffie-Hellman-like protocol based on proof of gullibility","authors":"M. Ceria, Alessandro De Piccoli, Theo Moriarty, Andrea Visconti","doi":"10.1109/ACDSA59508.2024.10468029","DOIUrl":null,"url":null,"abstract":"In the IEEE MILCOM 2018 conference proceedings was published a paper presenting a Diffie-Hellman-like protocol, more precisely, a \"lightweight key exchange protocol with provable security\". In this short paper, we show that the aforementioned protocol presents a fatal flow that makes the secret key a very simple combination of the public data. We then break explicitly the protocol. As a consequence, our main aim is to warn about the intrinsic risks in this protocol and discourage its practical usage, which would cause a leak of information.","PeriodicalId":518964,"journal":{"name":"2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)","volume":"311 19","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACDSA59508.2024.10468029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the IEEE MILCOM 2018 conference proceedings was published a paper presenting a Diffie-Hellman-like protocol, more precisely, a "lightweight key exchange protocol with provable security". In this short paper, we show that the aforementioned protocol presents a fatal flow that makes the secret key a very simple combination of the public data. We then break explicitly the protocol. As a consequence, our main aim is to warn about the intrinsic risks in this protocol and discourage its practical usage, which would cause a leak of information.