On the Feasibility of Key Compromise Impersonation Attacks against the Elliptic Curve version of the MTI/C0 Key Agreement Protocol
Recently, Eun-Jun Yooni and Kee-Young proposed the two-pass elliptic curve Diffie-Hellman key agreement protocol EECKE-1N that according to the authors is more efficient that ECKE-1N. In this paper we point out that the aforementioned protocol is in fact the elliptic curve version of the MTI/CO family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack.
Key Compromise Impersonation Key Agreement Protocols Elliptic Curves
Maurizio Adriano Strangio
Department of Mathematics University of rome Roma Tre Rome, Italy
国际会议
成都
英文
1534-1536
2010-12-17(万方平台首次上网日期,不代表论文的发表时间)