Skip to main content

Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols

  • Conference paper
Information Systems Security (ICISS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8303))

Included in the following conference series:

Abstract

The pairing-free ID-based authenticated key agreement (ID-AKA) protocol provides secure and efficient communication over the public network, which is introduced by Zhu et al. in 2007. Afterwards, a number of identity-based authenticated key agreement protocols have been proposed to meet a variety of desirable security and performance requirements. In this paper, we analyze Fiore and Gennaro’s scheme and demonstrate key off-set and forgery attack. We identify that Farash and Attari’s protocol is vulnerable to the forgery attack, key compromise impersonation attack, key off-set attack and known session key specific temporary information attack. We also show that Hou and Xu’s scheme also fails to resist key off-set and forgery attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences 180(15), 2895–2903 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  2. Xue-Fei, C., Kou Wei-Dong, F.K., Jun, Z.: An identity-based authenticated key agreement protocol without bilinear pairing. Chinese Journal of Electronics & Information Technology 31(5), 1241–1244 (2009)

    Google Scholar 

  3. Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. International Journal of Information Security 6(4), 213–241 (2007)

    Article  Google Scholar 

  4. Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. In: 2003 Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233 (2003)

    Google Scholar 

  5. Farash, M.S., Attari, M.A.: An id-based key agreement protocol based on ecc among users of separate networks. In: 2012 9th International ISC Conference on Information Security and Cryptology (ISCISC), pp. 32–37 (2012)

    Google Scholar 

  6. Fiore, D., Gennaro, R.: Identity-based key exchange protocols without pairings. Transactions on Computational Science X, 42–77 (2010)

    Google Scholar 

  7. Hou, M., Xu, Q.: A one-round id-based authenticated key agreement protocol with enhanced security. In: 2011 2nd International Conference on Intelligent Control and Information Processing (ICICIP), vol. 1, pp. 194–197 (2011)

    Google Scholar 

  8. Islam, S., Biswas, G.: An improved pairing-free identity-based authenticated key agreement protocol based on ecc. Procedia Engineering 30, 499–507 (2012)

    Article  Google Scholar 

  9. Just, M., Vaudenay, S.: Authenticated multi-party key agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 36–49. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  10. Smart, N.: Identity-based authenticated key agreement protocol based on weil pairing. Electronics Letters 38(13), 630–632 (2002)

    Article  MATH  Google Scholar 

  11. Xu, J., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications 34(3), 319–325 (2011)

    Article  Google Scholar 

  12. Zhu, R.W., Yang, G., Wong, D.S.: An efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices. Theoretical Computer Science 378(2), 198–207 (2007)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mishra, D., Mukhopadhyay, S. (2013). Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. In: Bagchi, A., Ray, I. (eds) Information Systems Security. ICISS 2013. Lecture Notes in Computer Science, vol 8303. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45204-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45204-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45203-1

  • Online ISBN: 978-3-642-45204-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics