attacks.pdf (273.07 kB)
Download file

Attacks on improved key distribution protocols with perfect reparability

Download (273.07 kB)
conference contribution
posted on 17.12.2009, 13:38 by Raphael C.-W. Phan, Bok-Min Goi
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all.

History

School

  • Mechanical, Electrical and Manufacturing Engineering

Citation

PHAN, R.C.-W., and GOI, B.-M., 2008. Attacks on improved key distribution protocols with perfect reparability. IN: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, (EUC '08), Shanghai, 17-20 Dec., Vol. 2, pp. 595-599

Publisher

© IEEE

Version

VoR (Version of Record)

Publication date

2008

Notes

This is a conference paper [© IEEE]. It is also available at: http://ieeexplore.ieee.org/ Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

ISBN

9780769534923

Language

en