基于身份的三方认证密钥协议密钥复制攻击

Wei Yuan, Liang Hu, Hongtu Li, Kuo Zhao, Jiang-feng Chu, Yuyu Sun
{"title":"基于身份的三方认证密钥协议密钥复制攻击","authors":"Wei Yuan, Liang Hu, Hongtu Li, Kuo Zhao, Jiang-feng Chu, Yuyu Sun","doi":"10.1109/NCIS.2011.147","DOIUrl":null,"url":null,"abstract":"In 2009, Mengbo Hou and Qiuliang Xu found the key replicating attack in the BR93 security model on a Certificateless two-party authenticated key agreement protocol proposed by Y.J Shi and J.H Li. In 2010, Marko Hölbl, Tatjana Welzer and Boštjan Brumen proposed a one-round identity-based three-party authenticated key agreement protocol using pairings called IDAK3-P1 and declared that the protocol had the attributes of known-key security, forward secrecy, key-compromise impersonation resilience, unknown key-share resilience and key control. In this paper, we make a systematic analysis on IDAK3-P1 and find it has similar structure as the Y.J Shi and J.H Li's protocol. We introduce Mengbo Hou and Qiuliang Xu's attack method in identifying the vulnerability of IDAK3-P1. Our analysis shows that the IDAK3-P1 is vulnerable to the key replicating attack in the BR model. Therefore, it doesn't possess the security attributes of implicit key authentication and key control as declared.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Key Replicating Attack on an Identity-Based Three-Party Authenticated Key Agreement Protocol\",\"authors\":\"Wei Yuan, Liang Hu, Hongtu Li, Kuo Zhao, Jiang-feng Chu, Yuyu Sun\",\"doi\":\"10.1109/NCIS.2011.147\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In 2009, Mengbo Hou and Qiuliang Xu found the key replicating attack in the BR93 security model on a Certificateless two-party authenticated key agreement protocol proposed by Y.J Shi and J.H Li. In 2010, Marko Hölbl, Tatjana Welzer and Boštjan Brumen proposed a one-round identity-based three-party authenticated key agreement protocol using pairings called IDAK3-P1 and declared that the protocol had the attributes of known-key security, forward secrecy, key-compromise impersonation resilience, unknown key-share resilience and key control. In this paper, we make a systematic analysis on IDAK3-P1 and find it has similar structure as the Y.J Shi and J.H Li's protocol. We introduce Mengbo Hou and Qiuliang Xu's attack method in identifying the vulnerability of IDAK3-P1. Our analysis shows that the IDAK3-P1 is vulnerable to the key replicating attack in the BR model. Therefore, it doesn't possess the security attributes of implicit key authentication and key control as declared.\",\"PeriodicalId\":215517,\"journal\":{\"name\":\"2011 International Conference on Network Computing and Information Security\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Network Computing and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIS.2011.147\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.147","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

2009年,侯梦波和徐秋良在石彦杰和李俊华提出的无证书双方认证密钥协议的BR93安全模型中发现了密钥复制攻击。2010年,Marko Hölbl、Tatjana Welzer和Boštjan Brumen提出了一种使用配对的基于一轮身份的三方认证密钥协议IDAK3-P1,并声明该协议具有已知密钥安全性、前向保密、密钥泄露模拟弹性、未知密钥共享弹性和密钥控制等属性。本文对IDAK3-P1协议进行了系统的分析,发现其结构与石玉杰和李俊辉的协议相似。在IDAK3-P1漏洞识别中,我们介绍了侯孟波和徐秋良的攻击方法。我们的分析表明,IDAK3-P1在BR模型中容易受到密钥复制攻击。因此,它不具备声明的隐式密钥认证和密钥控制的安全属性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Key Replicating Attack on an Identity-Based Three-Party Authenticated Key Agreement Protocol
In 2009, Mengbo Hou and Qiuliang Xu found the key replicating attack in the BR93 security model on a Certificateless two-party authenticated key agreement protocol proposed by Y.J Shi and J.H Li. In 2010, Marko Hölbl, Tatjana Welzer and Boštjan Brumen proposed a one-round identity-based three-party authenticated key agreement protocol using pairings called IDAK3-P1 and declared that the protocol had the attributes of known-key security, forward secrecy, key-compromise impersonation resilience, unknown key-share resilience and key control. In this paper, we make a systematic analysis on IDAK3-P1 and find it has similar structure as the Y.J Shi and J.H Li's protocol. We introduce Mengbo Hou and Qiuliang Xu's attack method in identifying the vulnerability of IDAK3-P1. Our analysis shows that the IDAK3-P1 is vulnerable to the key replicating attack in the BR model. Therefore, it doesn't possess the security attributes of implicit key authentication and key control as declared.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信