%0 Journal Article %T Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols %A Kim-Kwang Raymond Choo %J International Journal of Network Security %D 2008 %I Femto Technique %X Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We examine the class of key agreement protocols (without proofs of security) due to Mathuria and Jain (2005). Using these protocols as case studies, we demonstrate previously unpublished flaws in these protocols. We may speculate that such errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security. %K Key agreement protocol %K key establishment protocol %K provable security %K security model %U http://ijns.femto.com.tw/download_paper.jsp?PaperID=IJNS-2006-06-21-2&PaperName=ijns-v7-n1/ijns-2008-v7-n1-p15-23.pdf