51视频

World Journal of Computer Application and Technology(CEASE PUBLICATION) Vol. 2(2), pp. 48 - 51
DOI: 10.13189/wjcat.2014.020204
Reprint (PDF) (92Kb)


Revision and Enhancement of Two Three Party Key Agreement Protocols Vulnerable to KCI Attacks


Maurizio Adriano Strangio *
Department of Mathematics, University of Rome Roma Tre, Rome, Italy

ABSTRACT

In two recent papers, Zuowen Tan (Security and Communication Networks) and Chih-ho Chou et al. (Computers and Electronics) published three party key agreement protocols especially convenient for protecting communications in mobile-centric environments such as e-payments, vehicular mobile networks (VMN), RFID applications, etc. For his protocol, Tan provides a formal security proof developed in a model of distributed computing based on the seminal work of Bellare and Rogaway. In this paper, we show that both protocols are vulnerable to KCI attacks. We suggest modifications to both protocols that fix the vulnerability at the expense of a small decrease in their computational efficiency.

KEYWORDS
Three Party Key Agreement, Key Compromise Impersonation, Mobile Network Communications

Cite This Paper in IEEE or APA Citation Styles
(a). IEEE Format:
[1] Maurizio Adriano Strangio , "Revision and Enhancement of Two Three Party Key Agreement Protocols Vulnerable to KCI Attacks," World Journal of Computer Application and Technology(CEASE PUBLICATION), Vol. 2, No. 2, pp. 48 - 51, 2014. DOI: 10.13189/wjcat.2014.020204.

(b). APA Format:
Maurizio Adriano Strangio (2014). Revision and Enhancement of Two Three Party Key Agreement Protocols Vulnerable to KCI Attacks. World Journal of Computer Application and Technology(CEASE PUBLICATION), 2(2), 48 - 51. DOI: 10.13189/wjcat.2014.020204.