M. Ceria, Alessandro De Piccoli, Theo Moriarty, Andrea Visconti
{"title":"基于轻信证明的特洛伊-迪菲-赫尔曼类协议","authors":"M. Ceria, Alessandro De Piccoli, Theo Moriarty, Andrea Visconti","doi":"10.1109/ACDSA59508.2024.10468029","DOIUrl":null,"url":null,"abstract":"In the IEEE MILCOM 2018 conference proceedings was published a paper presenting a Diffie-Hellman-like protocol, more precisely, a \"lightweight key exchange protocol with provable security\". In this short paper, we show that the aforementioned protocol presents a fatal flow that makes the secret key a very simple combination of the public data. We then break explicitly the protocol. As a consequence, our main aim is to warn about the intrinsic risks in this protocol and discourage its practical usage, which would cause a leak of information.","PeriodicalId":518964,"journal":{"name":"2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)","volume":"311 19","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A troyan Diffie-Hellman-like protocol based on proof of gullibility\",\"authors\":\"M. Ceria, Alessandro De Piccoli, Theo Moriarty, Andrea Visconti\",\"doi\":\"10.1109/ACDSA59508.2024.10468029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the IEEE MILCOM 2018 conference proceedings was published a paper presenting a Diffie-Hellman-like protocol, more precisely, a \\\"lightweight key exchange protocol with provable security\\\". In this short paper, we show that the aforementioned protocol presents a fatal flow that makes the secret key a very simple combination of the public data. We then break explicitly the protocol. As a consequence, our main aim is to warn about the intrinsic risks in this protocol and discourage its practical usage, which would cause a leak of information.\",\"PeriodicalId\":518964,\"journal\":{\"name\":\"2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)\",\"volume\":\"311 19\",\"pages\":\"1-4\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACDSA59508.2024.10468029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACDSA59508.2024.10468029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A troyan Diffie-Hellman-like protocol based on proof of gullibility
In the IEEE MILCOM 2018 conference proceedings was published a paper presenting a Diffie-Hellman-like protocol, more precisely, a "lightweight key exchange protocol with provable security". In this short paper, we show that the aforementioned protocol presents a fatal flow that makes the secret key a very simple combination of the public data. We then break explicitly the protocol. As a consequence, our main aim is to warn about the intrinsic risks in this protocol and discourage its practical usage, which would cause a leak of information.