Abstract
Recently, there was a new authentication and key distribution protocol presented in [EHA98]. In this paper we show that certain claims on its properties are not valid. We also suggest some modifications to strengthen this protocol.
Chapter PDF
Similar content being viewed by others
References
Bellare M., Rogaway P.: Provably secure session key distribution–the three party case, Proceedings of the 27th Annual Symposium on the Theory of Computing, ACM, pp. 57–66, 1995.
Burrows M., Abadi M., Needham R.M.: A Logic of Authentication, ACM Transactions of Computer Systems, Vol. 8, No. 1, pp. 18–36, 1990.
Chaum D., Evertse J.H., van der Graff J., Peralta R.: An Improved Protocol for Demonstrating Possesion of Discrete Logarithms and Some Generalizations, Advances in Cryptology–EUROCRYPT’87 Proceedings, Springer-Verlag, pp. 127–141, 1988.
El-Hadidi M.T., Hegazi N.H., Asian H.K.: Logic-Based Analysis of a New Hybrid Encryption Protocol for Authentication and Key Distribution, IFIP 14th International Conference 95 on Information Security, 15th World Computer Congress, pp. 173–183, 1998.
Ford W.: Computer Communications Security: Principals, Standard Protocols and Techniques, Prentice-Hall, 1994.
Kohl J.T., Neuman B.C., Tso T.: The Evolution of the Kerberos Authentication System, Distributed Open Systems, IEEE Computer Society Press, pp. 78–94, 1994.
Meadows C.: Applying Formal Methods to the Analysis of a Key Management Protocol, Journal of Computer Security, Vol. 1, No. 1, pp. 5–53, 1992.
Rubin A.D., Honeyman P.: Formal Methods for the Analysis of Authentication Protocols, CITI Technical Report 93–7, Dept. of Electrical Engineering and Computer Science, University of Michigan, 1993.www.citi.umich.edu/techreports/reports/citi-tr-93–7.pdf
Tardo J.J., Alagappan K.: SPX: Global Authentication Using Public Key Certificates, IEEE Privacy and Security Conference, 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Stanek, M., Olejár, D. (1999). Weaknesses in EHA Authentication and Key Distribution Protocol. In: Preneel, B. (eds) Secure Information Networks. IFIP — The International Federation for Information Processing, vol 23. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35568-9_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-35568-9_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6487-1
Online ISBN: 978-0-387-35568-9
eBook Packages: Springer Book Archive