Networking

On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

Download Now Free registration required

Executive Summary

In this paper, the authors point out that the protocol proposed by the aforementioned authors is in fact the elliptic curve version of the MTI/C0 family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack. Since the Diffie-Hellman (DH) key exchange scheme was published in 1976, to address the problem of communicating on insecure networks, a large number of key agreement protocols based on this paradigm have been proposed by many researchers

  • Format: PDF
  • Size: 764.5 KB