Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol

Hung Min Sun*, Bin Tsan Hsieh, S. Tseng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

With the rapid development of communication technology, wireless technology has become more and more important, and has been widely used in personal communication. Recently, Aydos et al. proposed an ECC-based authenticated key agreement protocol for wireless communication. In their protocol, they used ECDSA and Diffie-Hellman key agreement to provide authentication and to obtain a session key for later communication. In this paper, however, we show that Aydos et al's ECC-based authenticated key agreement protocol for wireless communication does not achieve some essential security requirements including forward secrecy, known-key security, and mutual authentication.

Original languageEnglish
Title of host publicationProceedings - 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2004
EditorsS.T. Yuan, J. Liu
Pages563-566
Number of pages4
DOIs
StatePublished - 24 Sep 2004
EventProceedings - 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2004 - Taipei, Taiwan
Duration: 28 Mar 200431 Mar 2004

Publication series

NameProceedings - 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2004

Conference

ConferenceProceedings - 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2004
CountryTaiwan
CityTaipei
Period28/03/0431/03/04

Fingerprint Dive into the research topics of 'Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol'. Together they form a unique fingerprint.

Cite this