Download presentation
Presentation is loading. Please wait.
1
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20
2
2 Outline Introduction Review of Hwang et al.’s protocol Attack Conclusions
3
3 Introduction (1) Diffie-Hellman key agreement protocol Man in middle attack Authentication key exchange protocol Perfect forward secrecy
4
4 Introduction (2) 2004 Hwang-Chang- Lin-Tsai 2005 This paper 1998 Harn and Lin Based on Diffie-Hellman 2001 Harn and Lin Multiple common session key 2003 Hwang, Shiau and Lai Using XOR Perfect forward secrecy High computation cost Forgery signature attack
5
5 Review of Hwang et al.’s protocol Notations Step 1 -- Alice computes Step 2 -- Bob verifies Alice and computes Step 3 -- Alice verifies Bob Multiple common session keys
6
6 Notations p : a large prime chosen by system g : a primitive root in GF(p) : long-term private key chosen by Alice and Bob respectively, and associative public keys and certificates are
7
7 Step 1 AliceBob
8
8 Step 2 AliceBob
9
9 Step 3 Alice
10
10 Multiple common session keys
11
11 Attack Eve does the following steps to impersonate Alice and agree session key with Bob Step 1 Step 2 Step 3
12
12 Step 1 The adversary Eve randomly chooses t and computes
13
13 Step 2 When Bob receives the message, he verifies the message by the following equation :
14
14 Step 3 The adversary can compute two of the session key Computed by Eve
15
15 Conclusions In this paper, we show that Hwang- Chang-Lin-Tsai protocol is vulnerable to forgery signature attack. To find an efficient and secure authentication key exchange protocol deserves future work.
16
16 Thanks!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.