作者
Zeyad Mohammad, Ahmad AA Alkhatib, Mohammed Lafi, Ahmad Abusukhon, Dheeb Albashish, Jaffar Atwan
发表日期
2021/7/14
研讨会论文
2021 International Conference on Information Technology (ICIT)
页码范围
218-223
出版商
IEEE
简介
Authenticated key exchange protocols are a fundamental cryptography building block for establishing a secret shared key among participating parties over an open network model. Mohamed et al. proposed a tightly-secure authenticated key exchange without NAXOS approach based on decision linear problem in order to solve an open problem for designing an authenticated key exchange protocol without using NAXOS trick. Mohamed et al.'s protocol has tight security proof in the eCK model under the random oracle problem and its security claims verified by using the games sequence tool. However, we show that Mohamed et al.’s protocol cannot withstand the key compromise impersonation attacks and man in the middle attacks. Furthermore, Mohamed et al.'s protocol cannot provide an implicit entity authentication property since it is a basic security property for an authenticated key exchange protocol. Therefore …
引用总数
学术搜索中的文章
Z Mohammad, AAA Alkhatib, M Lafi, A Abusukhon… - 2021 International Conference on Information …, 2021