会议专题

On the Feasibility of Key Compromise Impersonation Attacks against the Elliptic Curve version of the MTI/C0 Key Agreement Protocol

Recently, Eun-Jun Yooni and Kee-Young proposed the two-pass elliptic curve Diffie-Hellman key agreement protocol EECKE-1N that according to the authors is more efficient that ECKE-1N. In this paper we point out that the aforementioned protocol is in fact the elliptic curve version of the MTI/CO family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack.

Key Compromise Impersonation Key Agreement Protocols Elliptic Curves

Maurizio Adriano Strangio

Department of Mathematics University of rome Roma Tre Rome, Italy

国际会议

2010 International Conference on Information Security and Artificial Intelligence(2010年信息安全与人工智能国际会议 ISAI 2010)

成都

英文

1534-1536

2010-12-17(万方平台首次上网日期,不代表论文的发表时间)