Abstract
The pairing-free ID-based authenticated key agreement (ID-AKA) protocol provides secure and efficient communication over the public network, which is introduced by Zhu et al. in 2007. Afterwards, a number of identity-based authenticated key agreement protocols have been proposed to meet a variety of desirable security and performance requirements. In this paper, we analyze Fiore and Gennaro’s scheme and demonstrate key off-set and forgery attack. We identify that Farash and Attari’s protocol is vulnerable to the forgery attack, key compromise impersonation attack, key off-set attack and known session key specific temporary information attack. We also show that Hou and Xu’s scheme also fails to resist key off-set and forgery attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences 180(15), 2895–2903 (2010)
Xue-Fei, C., Kou Wei-Dong, F.K., Jun, Z.: An identity-based authenticated key agreement protocol without bilinear pairing. Chinese Journal of Electronics & Information Technology 31(5), 1241–1244 (2009)
Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. International Journal of Information Security 6(4), 213–241 (2007)
Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. In: 2003 Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233 (2003)
Farash, M.S., Attari, M.A.: An id-based key agreement protocol based on ecc among users of separate networks. In: 2012 9th International ISC Conference on Information Security and Cryptology (ISCISC), pp. 32–37 (2012)
Fiore, D., Gennaro, R.: Identity-based key exchange protocols without pairings. Transactions on Computational Science X, 42–77 (2010)
Hou, M., Xu, Q.: A one-round id-based authenticated key agreement protocol with enhanced security. In: 2011 2nd International Conference on Intelligent Control and Information Processing (ICICIP), vol. 1, pp. 194–197 (2011)
Islam, S., Biswas, G.: An improved pairing-free identity-based authenticated key agreement protocol based on ecc. Procedia Engineering 30, 499–507 (2012)
Just, M., Vaudenay, S.: Authenticated multi-party key agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 36–49. Springer, Heidelberg (1996)
Smart, N.: Identity-based authenticated key agreement protocol based on weil pairing. Electronics Letters 38(13), 630–632 (2002)
Xu, J., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications 34(3), 319–325 (2011)
Zhu, R.W., Yang, G., Wong, D.S.: An efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices. Theoretical Computer Science 378(2), 198–207 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mishra, D., Mukhopadhyay, S. (2013). Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. In: Bagchi, A., Ray, I. (eds) Information Systems Security. ICISS 2013. Lecture Notes in Computer Science, vol 8303. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45204-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-45204-8_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-45203-1
Online ISBN: 978-3-642-45204-8
eBook Packages: Computer ScienceComputer Science (R0)