Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther

Z Mohammad - International Journal of Communication …, 2020 - Wiley Online Library
Hao proposed the YAK as a robust key agreement based on public‐key authentication, and
the author claimed that the YAK protocol withstands all known attacks and therefore is …

[PDF][PDF] Cryptanalysis of an efficient protocol for authenticated key agreement

Z Mohammad - ICIC Express Letters, 2019 - icicel.org
In NRSC28, Elkamchouchi and Abu Elkair proposed an efficient protocol for authenticated
key agreement, and the authors claimed that the proposed protocol is secure against known …

Security analysis of Shim's authenticated key agreement protocols from pairings

HM Sun, BT Hsieh - Cryptology EPrint Archive, 2003 - eprint.iacr.org
Recently, Shim proposed a tripartite authenticated key agreement protocol from Weil pairing
to overcome the security flaw in Joux's protocol. Later, Shim also proposed an ID-based …

Cryptanalysis of a secure and efficient three-pass authenticated key agreement protocol based on elliptic curves

Z Mohammad, CL Hsu, YC Chen, CC Lo - 網際網路技術學刊, 2013 - airitilibrary.com
Key agreement protocols are a foundation for distributing a common secret key over an
insecure network. Lim et al. proposed a secure and efficient three-pass authenticated key …

Cryptanalysis of simple authenticated key agreement protocols

CC Yang, TY Chang, MS Hwang - IEICE transactions on …, 2004 - search.ieice.org
In this article, we will present a modification attack and a dictionary attack to subvert the
security of the Tseng scheme and the Ku-Wang scheme. As we know, no existing schemes …

Security weaknesses of authenticated key agreement protocols

P Nose - Information Processing Letters, 2011 - Elsevier
In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of
Hölbl et al. After the analysis, we found that Tan et al. ʼs, Lim et al. ʼs and two protocols of …

Ephemeral key compromise attack on the ib-ka protocol

Q Cheng, C Ma - Cryptology ePrint Archive, 2009 - eprint.iacr.org
Abstract Recently, Dario Fiore and Rosario Gennaro proposed the IB-KA protocol, which
was inspired by MQV protocol. They provide a full proof of security of IB-KA protocol using …

Efficient and secure key exchange protocol based on elliptic curve and security models

A Abusukhon, Z Mohammad… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
nowadays, the success of many online applications relays on keeping the data sent through
the global network secure and far away from hackers. To carry out this task, the two …

Pairing-based two-party authenticated key agreement protocol

R Lu, Z Cao, R Su, J Shao - Cryptology ePrint Archive, 2005 - eprint.iacr.org
To achieve secure data communications, two parties should be authenticated by each other
and agree on a secret session key by exchanging messages over an insecure channel. In …

Cryptanalysis and enhancement of two-pass authenticated key agreement with key confirmation protocols

Z Mohammad, YC Chen, CL Hsu, CC Lo - IETE Technical Review, 2010 - Taylor & Francis
In NRSC24, Elkamchouchi et al. proposed a new approach for key controlled agreement to
provide key control in the Pour public key distribution system. In NRSC25, they further …