Security

Security Weakness in Two Authenticated Key Exchange Protocols

Download Now Free registration required

Executive Summary

In ICA3PP 2009, Xinglan Zhang proposed two one-round authenticated key exchange protocols and proved their security in the standard model. In this paper, the authors analyze these two protocols and find that both of them exist some flaws. Authenticated Key Exchange (AKE) protocols enable two party to share common session keys in an authentic way. An AKE protocol is called secure if under the allowed adversarial actions it is infeasible for the attacker to distinguish the value of a key generated by the protocol from an independent random value.

  • Format: PDF
  • Size: 87.7 KB