首页> 外文期刊>International journal of ad hoc and ubiquitous computing >Impersonation attack on Certif icateLess key agreement protocol
【24h】

Impersonation attack on Certif icateLess key agreement protocol

机译:对无证书密钥协商协议的模拟攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Key agreement is a fundamental activity to establish communication between two parties. Kim et al. (2013) proposed a CertificateLess two-party authenticated key agreement (CTAKA) protocol, which is secure in extended Canetti-Krawczyk (eCK) model. This paper describes the security flaw of Kim et al.'s CTAKA protocol, which is found vulnerable against Key-Compromise Impersonation (K-CI) attack. For the resistance of the attack in Kim et al.'s CTAKA protocol, a defensive measure has been proposed, which is secure in eCK model.
机译:关键协议是建立两方之间沟通的一项基本活动。 Kim等。 (2013年)提出了一个CertificateLess双向认证密钥协议(CTAKA)协议,该协议在扩展的Canetti-Krawczyk(eCK)模型中是安全的。本文介绍了Kim等人的CTAKA协议的安全漏洞,发现该漏洞容易受到密钥泄露模拟(K-CI)攻击。为了抵抗Kim等人的CTAKA协议中的攻击,提出了一种防御措施,该措施在eCK模型中是安全的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号