Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction
文献类型:期刊论文
作者 | Lu, SQ ; Zhao, JH ; Cheng, QF |
刊名 | INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
![]() |
出版日期 | 2016 |
卷号 | 29期号:3页码:567-578 |
关键词 | KCI attack SC attack Scyther authenticated key exchange protocol |
ISSN号 | 1074-5351 |
中文摘要 | The SMEN protocol, proposed by Wu and Ustaoglu in 2009, has been considered to be secure as the authors claimed, and numerous theories are proposed based on this protocol. This paper analyzes the SMEN protocol and finds that this protocol is not resistant to the session corruption attack and the key compromise impersonation attack. Then, we propose an improved protocol with tight security reduction. Our improved protocol not only avoids the above attacks but also embraces the same efficiency as the SMEN protocol in terms of exponentiation. Besides, formal analysis of the improved protocol is presented by using the formal automatic security analysis tool Scyther. Copyright (c) 2014 John Wiley & Sons, Ltd. |
英文摘要 | The SMEN protocol, proposed by Wu and Ustaoglu in 2009, has been considered to be secure as the authors claimed, and numerous theories are proposed based on this protocol. This paper analyzes the SMEN protocol and finds that this protocol is not resistant to the session corruption attack and the key compromise impersonation attack. Then, we propose an improved protocol with tight security reduction. Our improved protocol not only avoids the above attacks but also embraces the same efficiency as the SMEN protocol in terms of exponentiation. Besides, formal analysis of the improved protocol is presented by using the formal automatic security analysis tool Scyther. Copyright (c) 2014 John Wiley & Sons, Ltd. |
收录类别 | SCI |
语种 | 英语 |
WOS记录号 | WOS:000369147500010 |
公开日期 | 2016-12-13 |
源URL | [http://ir.iscas.ac.cn/handle/311060/17411] ![]() |
专题 | 软件研究所_软件所图书馆_期刊论文 |
推荐引用方式 GB/T 7714 | Lu, SQ,Zhao, JH,Cheng, QF. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction[J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS,2016,29(3):567-578. |
APA | Lu, SQ,Zhao, JH,&Cheng, QF.(2016).Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS,29(3),567-578. |
MLA | Lu, SQ,et al."Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction".INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 29.3(2016):567-578. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。