Attacks on improved key distribution protocols with perfect reparability

In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply t...

Full description

Saved in:
Bibliographic Details
Main Authors: Raphael C.-W. Phan, Bok-Min Goi
Format: Default Conference proceeding
Published: 2008
Subjects:
Online Access:https://hdl.handle.net/2134/5694
Tags: Add Tag
No Tags, Be the first to tag this record!
id rr-article-9553874
record_format Figshare
spelling rr-article-95538742008-01-01T00:00:00Z Attacks on improved key distribution protocols with perfect reparability Raphael C.-W. Phan (7168670) Bok-Min Goi (7209122) Mechanical engineering not elsewhere classified Cryptanalysis Key distribution protocols Security protocols Mechanical Engineering not elsewhere classified In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all. 2008-01-01T00:00:00Z Text Conference contribution 2134/5694 https://figshare.com/articles/conference_contribution/Attacks_on_improved_key_distribution_protocols_with_perfect_reparability/9553874 CC BY-NC-ND 4.0
institution Loughborough University
collection Figshare
topic Mechanical engineering not elsewhere classified
Cryptanalysis
Key distribution protocols
Security protocols
Mechanical Engineering not elsewhere classified
spellingShingle Mechanical engineering not elsewhere classified
Cryptanalysis
Key distribution protocols
Security protocols
Mechanical Engineering not elsewhere classified
Raphael C.-W. Phan
Bok-Min Goi
Attacks on improved key distribution protocols with perfect reparability
description In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all.
format Default
Conference proceeding
author Raphael C.-W. Phan
Bok-Min Goi
author_facet Raphael C.-W. Phan
Bok-Min Goi
author_sort Raphael C.-W. Phan (7168670)
title Attacks on improved key distribution protocols with perfect reparability
title_short Attacks on improved key distribution protocols with perfect reparability
title_full Attacks on improved key distribution protocols with perfect reparability
title_fullStr Attacks on improved key distribution protocols with perfect reparability
title_full_unstemmed Attacks on improved key distribution protocols with perfect reparability
title_sort attacks on improved key distribution protocols with perfect reparability
publishDate 2008
url https://hdl.handle.net/2134/5694
_version_ 1797287051639390208