Title | ||
---|---|---|
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment. |
Abstract | ||
---|---|---|
Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks. Security must be given the topmost priority in the design of a key establishment protocol. In this work, we provide a security analysis on two recent key establishment protocols: Harn and Lin's group key transfer protocol and Dutta and Barua's group key agreement protocol. Our analysis shows that both the Harn-Lin protocol and the Dutta-Barua protocol have a flaw in their design and can be easily attacked. The attack we mount on the Harn-Lin protocol is a replay attack whereby a malicious user can obtain the long-term secrets of any other users. The Dutta-Barua protocol is vulnerable to an unknown key-share attack. For each of the two protocols, we present how to eliminate their security vulnerabilities. We also improve Dutta and Barua's proof of security to make it valid against unknown key share attacks. |
Year | DOI | Venue |
---|---|---|
2012 | 10.3837/tiis.2012.02.018 | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS |
Keywords | Field | DocType |
Security,group key establishment,attack,secret sharing | Group key,Key distribution,Computer science,Computer security,Computer network,Otway–Rees protocol,Security association,Reflection attack,Key-agreement protocol,Replay attack,Universal composability | Journal |
Volume | Issue | ISSN |
6 | SP2 | 1976-7277 |
Citations | PageRank | References |
13 | 9.14 | 1 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Junghyun Nam | 1 | 357 | 47.86 |
Moonseong Kim | 2 | 143 | 39.75 |
Juryon Paik | 3 | 147 | 24.72 |
Dongho Won | 4 | 1262 | 154.14 |