TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)
Current Result Document : 7 / 8
ÇѱÛÁ¦¸ñ(Korean Title) |
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment |
¿µ¹®Á¦¸ñ(English Title) |
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment |
ÀúÀÚ(Author) |
Junghyun Nam
Moonseong Kim
Juryon Paik
Dongho Won
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 06 NO. 02 PP. 0751 ~ 0765 (2012. 02) |
Çѱ۳»¿ë (Korean Abstract) |
|
¿µ¹®³»¿ë (English Abstract) |
Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks. Security must be given the topmost priority in the design of a key establishment protocol. In this work, we provide a security analysis on two recent key establishment protocols: Harn and Lin¡¯s group key transfer protocol and Dutta and Barua¡¯s group key agreement protocol. Our analysis shows that both the Harn-Lin protocol and the Dutta-Barua protocol have a flaw in their design and can be easily attacked. The attack we mount on the Harn-Lin protocol is a replay attack whereby a malicious user can obtain the long-term secrets of any other users. The Dutta-Barua protocol is vulnerable to an unknown key-share attack. For each of the two protocols, we present how to eliminate their security vulnerabilities. We also improve Dutta and Barua¡¯s proof of security to make it valid against unknown key share attacks. |
Å°¿öµå(Keyword) |
Security
group key establishment
attack
secret sharing
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|