{"title":"加强防范中间人攻击的megreishvili协议","authors":"Muhammad Arzaki","doi":"10.1109/ICOICT.2018.8528731","DOIUrl":null,"url":null,"abstract":"In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key agreement. We demonstrate that the conventional version of this protocol is vulnerable to the man-in-the-middle attack. Hence, to avert such attack, we propose an authenticated version of this protocol using an embedded digital signature scheme. The scheme is constructed using the hardness assumption of the Megrelishvili vector-matrix problem (MVMP)—the underlying computational problem for the security of the conventional Megrelishvili protocol. We prove the correctness of the signature scheme and argue that our proposed protocol is secure against the man-in-the-middle attack provided that the MVMP is intractable.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack\",\"authors\":\"Muhammad Arzaki\",\"doi\":\"10.1109/ICOICT.2018.8528731\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key agreement. We demonstrate that the conventional version of this protocol is vulnerable to the man-in-the-middle attack. Hence, to avert such attack, we propose an authenticated version of this protocol using an embedded digital signature scheme. The scheme is constructed using the hardness assumption of the Megrelishvili vector-matrix problem (MVMP)—the underlying computational problem for the security of the conventional Megrelishvili protocol. We prove the correctness of the signature scheme and argue that our proposed protocol is secure against the man-in-the-middle attack provided that the MVMP is intractable.\",\"PeriodicalId\":266335,\"journal\":{\"name\":\"2018 6th International Conference on Information and Communication Technology (ICoICT)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 6th International Conference on Information and Communication Technology (ICoICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOICT.2018.8528731\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Conference on Information and Communication Technology (ICoICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOICT.2018.8528731","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Strengthening Megrelishvili Protocol Against Man-in-the-Middle Attack
In this paper we study the security aspect of Megrelishvili protocol—a linear algebra-based variant of the Diffie-Hellman key agreement. We demonstrate that the conventional version of this protocol is vulnerable to the man-in-the-middle attack. Hence, to avert such attack, we propose an authenticated version of this protocol using an embedded digital signature scheme. The scheme is constructed using the hardness assumption of the Megrelishvili vector-matrix problem (MVMP)—the underlying computational problem for the security of the conventional Megrelishvili protocol. We prove the correctness of the signature scheme and argue that our proposed protocol is secure against the man-in-the-middle attack provided that the MVMP is intractable.