Networking

On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

Download Now Date Added: Sep 2012
Format: PDF

In this paper, the authors point out that the protocol proposed by the aforementioned authors is in fact the elliptic curve version of the MTI/C0 family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack. Since the Diffie-Hellman (DH) key exchange scheme was published in 1976, to address the problem of communicating on insecure networks, a large number of key agreement protocols based on this paradigm have been proposed by many researchers