Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol  [cached]
Kim-Kwang Raymond Choo
International Journal of Network Security , 2006,
Abstract: In recent issue of Journal of Applied Mathematics and Computation (2005), Lee, Kim, & Yoo revealed an attack on Hsu, Wu, & Wu (2003) authenticated key agreement protocol, and then presented an improved protocol. However, Lee, Kim, & Yoo (2005) present only heuristic argument with no formal proof of security. In this work, we revealed previously unpublished flaw in the protocol. We may speculate that such errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security. We conclude with a countermeasure due to Choo, Boyd, & Hitchcock (2005).
Password-Based Key Agreement Protocol  [PDF]
Chunbo Ma,Jun Ao,Jianhua Li
Information Technology Journal , 2007,
Abstract: In this study, we will review Kim et al.’s protocol and Lee et al.’s protocol respectively and show that their protocols are not secure as they have claimed. Then, we firstly present our improved password-based key agreement protocol based on Kim et al.’s scheme and show that it withstands password guessing attack and illegal modification. Then we propose an improved Verifier-based key agreement protocol based on Lee et al.’s scheme and demonstrate that it is secure against Stolen-verifier attack and password guessing attack.
Formal Verification and Improvement of an Authentication Protocol

HE Li,WANG Li-Bin,

计算机系统应用 , 2010,
Abstract: Password-based remote user authentication is a hotspot in authentication protocol research. The security of a proposed remote user authentication scheme, the Lee-Kim-Yoo protocol, advanced by Sung-Woon Lee is analyzed, which used nonce random and had very low computational costs. However, this scheme still has many security faults. The weakness of the scheme is demonstrated. This paper proposes an improved scheme, a novel nonce and hash-based remote user authentication scheme using smart cards and analyses the amended protocol with BAN logic. It indicates that the amended protocol can reach the goal of the protocol.
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols  [cached]
Kim-Kwang Raymond Choo
International Journal of Network Security , 2008,
Abstract: Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We examine the class of key agreement protocols (without proofs of security) due to Mathuria and Jain (2005). Using these protocols as case studies, we demonstrate previously unpublished flaws in these protocols. We may speculate that such errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security.
Lee, Han, and Kim Reply  [PDF]
Ki-Suk Lee,Dong-Soo Han,Sang-Koog Kim
Physics , 2013, DOI: 10.1103/PhysRevLett.111.149702
Abstract: In Letter [1], we reported our finding on the physical origin of wide band-gap opening in planar nanostrips, as derived by application of periodic width modulations in the magnetic waveguides. K. Di et al. in their Comment[2], however, argued that the band gap can be reduced remarkably by applying a linear combination of symmetric and antisymmetric fields (see 'A+B' in the inset of Fig. 1(a)). They also insisted that they could find a complete set of magnonic bands based on all of the mode symmetries. However, their work does not constitute grounds for judging our method "wrong" and our conclusions "erroneous". Moreover, the excitation field alluded to in the Comment is not sufficiently general to obtain the complete set of magnonic band structures, but rather remains specific. The grounds of these conclusions, drawn from our further work, are the following.
Experimental study for Yuen-Kim protocol of quantum key distribution with unconditional secure  [PDF]
O. Hirota,K. Kato,M. Sohma
Physics , 2002,
Abstract: In this report, we simulate practical feature of Yuen-Kim protocol for quantum key distribution with unconditional secure. In order to demonstrate them experimentally by intensity modulation/direct detection(IMDD) optical fiber communication system, we use simplified encoding scheme to guarantee security for key information(1 or 0). That is, pairwise M-ary intensity modulation scheme is employed. Furthermore, we give an experimental implementation of YK protocol based on IMDD.
Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols  [PDF]
Joe-Kai Tsay,Stig Mj?lsnes
Computer Science , 2012,
Abstract: We present a computational security analysis of the Authentication and Key Agreement (AKA) protocols for both Long-Term Evolution (LTE) and Universal Mobile Telecommunications System (UMTS). This work constitutes the first security analysis of LTE AKA to date and the first computationally sound analysis of UMTS AKA. Our work is the first formal analysis to consider messages that are sent in the core network, where we take into account details of the carrying protocol (i.e., MAP or Diameter) and of the mechanism for secure transport (i.e., MAPsec/TCAPsec or IPsec ESP). Moreover, we report on a deficiency in the protocol specifications of UMTS AKA and LTE AKA and the specifications of the core network security (called network domain security), which may enable efficient attacks. The vulnerability allows an inside attacker not only to impersonate an honest protocol participant during a run of the protocol but also to subsequently use wireless services on his behalf. UMTS AKA run over MAP with MAPsec seems vulnerable in the most straight-forward application of the attack. On the other hand, our analysis shows that UMTS and LTE AKA over Diameter/IPsec and UMTS AKA over MAP/TCAPsec (with sufficiently long session identifiers) computationally satisfy intended authentication properties as well as some key secrecy properties, assuming that the used primitives meet standard cryptographic assumptions.
Security V/S Qos for LTE Authentication and Key Agreement Protocol  [PDF]
Jacques Bou Abdo,Jacques Demerjian,Hakima Chaouchi
International Journal of Network Security & Its Applications , 2012,
Abstract: Protocol and technology convergence, the core of near future communication, will soon be forming theinteroperating heterogeneous networks. Attaining a strict secure authentication without risking the QoSperformance and call success rates is a major concern when it comes to wireless heterogeneousnetworks. In order to achieve this, a generic, fast and secure, Authentication and Key Agreement protocolis to be used; a version of which is to be implemented between each two technologies. In this research,different existing EPS-EPS AKA protocols will be compared with our proposed protocol EC-AKA(Ensure Confidentiality Authentication and Key Agreement) based on security, cost effectiveness,signaling overhead, delay and performance. It is proven that EC-AKA is the exclusive protocol satisfyingthe New Generation Network’s KPIs and it will be promoted as the target generic AKA protocol inheterogeneous networks.
Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol  [cached]
Kou-Min Cheng,Ting-Yi Chang,Jung-Wen Lo
International Journal of Network Security , 2010,
Abstract: Recently, Chang et al. proposed a security enhancement in Ku and Wang's authenticated key agreement protocol. Two parties employ the pre-shared password to agreement a common session key via insecure network. However, in this article, we will show that Chang et al.'s scheme is suffer from the backward replay attack and the off-line password guessing attack.
Password-based Encrypted Group Key Agreement  [cached]
Ratna Dutta,Rana Barua
International Journal of Network Security , 2006,
Abstract: This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumption. In a password-based key agreement protocol, the users only share a human-memorable low entropy password; and using this low-entropy password, the users can agree upon a high-entropy session key which they may use to build a secure communication channel among themselves. While designing such protocols, one should limit the number of on-line password guessing and achieve the security against dictionary attack. Our protocol is obtained from the multi-party key agreement protocol of Kim et al. We analyze the security in the security model formalized by Bellare et al. following their proof techniques. Our proposed scheme achieves efficiency in both communication and computation aspects and is proven to be secure in both the ideal cipher model and the random oracle model.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.