Security issues in a group key establishment protocol
نویسندگان
چکیده
منابع مشابه
Security issues in a group key establishment protocol
Major shortcomings in a recently published group key establishment protocol are described. These shortcomings are sufficiently serious that the protocol should not be used.
متن کاملAnalysis of a key-establishment security protocol
Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with attacks against security protocols. Security protocols are int...
متن کاملSecurity Issues in the Diffie-Hellman Key Agreement Protocol
Diffie-Hellman key agreement protocol [27] implementations have been plagued by serious security flaws. The attacks can be very subtle and, more often than not, haven’t been taken into account by protocol designers. In this paper we attempt to provide a link between theoretical research and real-world implementations. In addition to exposing the most important attacks and issues we present fair...
متن کاملOn The Security of a Group Key Agreement Protocol
Tseng [1] proposes a group key agreement protocol for use in a wireless network consisting of a number of low-power mobile nodes with limited computational and communicational resources, and a powerful wireless gateway with much greater resources. In such a wireless network, each low-power node can send messages to the powerful node via unicast communication, and the powerful node can broadcast...
متن کاملAttribute-based group key establishment
Motivated by the problem of establishing a session key among parties based on the possession of certain credentials only, we discuss a notion of attribute-based key establishment. A number of new issues arise in this setting that are not present in the usual settings of group key establishment where unique user identities are assumed to be publicly available. After detailing the security model,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Computer Journal
سال: 2018
ISSN: 0010-4620,1460-2067
DOI: 10.1093/comjnl/bxy058