Attacks on improved key distribution protocols with perfect reparability
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply t...
Saved in:
Main Authors: | , |
---|---|
Format: | Default Conference proceeding |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/5694 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
rr-article-9553874 |
---|---|
record_format |
Figshare |
spelling |
rr-article-95538742008-01-01T00:00:00Z Attacks on improved key distribution protocols with perfect reparability Raphael C.-W. Phan (7168670) Bok-Min Goi (7209122) Mechanical engineering not elsewhere classified Cryptanalysis Key distribution protocols Security protocols Mechanical Engineering not elsewhere classified In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all. 2008-01-01T00:00:00Z Text Conference contribution 2134/5694 https://figshare.com/articles/conference_contribution/Attacks_on_improved_key_distribution_protocols_with_perfect_reparability/9553874 CC BY-NC-ND 4.0 |
institution |
Loughborough University |
collection |
Figshare |
topic |
Mechanical engineering not elsewhere classified Cryptanalysis Key distribution protocols Security protocols Mechanical Engineering not elsewhere classified |
spellingShingle |
Mechanical engineering not elsewhere classified Cryptanalysis Key distribution protocols Security protocols Mechanical Engineering not elsewhere classified Raphael C.-W. Phan Bok-Min Goi Attacks on improved key distribution protocols with perfect reparability |
description |
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all. |
format |
Default Conference proceeding |
author |
Raphael C.-W. Phan Bok-Min Goi |
author_facet |
Raphael C.-W. Phan Bok-Min Goi |
author_sort |
Raphael C.-W. Phan (7168670) |
title |
Attacks on improved key distribution protocols with perfect reparability |
title_short |
Attacks on improved key distribution protocols with perfect reparability |
title_full |
Attacks on improved key distribution protocols with perfect reparability |
title_fullStr |
Attacks on improved key distribution protocols with perfect reparability |
title_full_unstemmed |
Attacks on improved key distribution protocols with perfect reparability |
title_sort |
attacks on improved key distribution protocols with perfect reparability |
publishDate |
2008 |
url |
https://hdl.handle.net/2134/5694 |
_version_ |
1797287051639390208 |