Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancement

Zeyad Mohammad, Chi-Chun Lo

Research output: Contribution to conferencePaperpeer-review

5 Scopus citations

Abstract

Authenticated key agreement protocols are a foundation for delivering an authenticated session key between the intended two-party participants from a set of parties over an insecure network. Wang et al proposed protocol ECKE-1N to overcome KCI-R attacks in ECKE-1 as an implicit authenticated key agreement protocol based on Diffie-Hellman elliptic curve. In this paper, we show that ECKE-1N is vulnerable to both leakage of ephemeral private keys and KCI-R attacks. We present an enhanced protocol EECKE-1N, which can withstand KCI-R attacks and revelations both of ephemeral keys. Furthermore, EECKE-1N can provide desirable security proprieties.
Original languageEnglish
Pages 128-132
Number of pages5
DOIs
StatePublished - May 2009
Event1st International Conference on E-Business and Information System Security - Wuhan, China
Duration: 23 May 200924 May 2009

Conference

Conference1st International Conference on E-Business and Information System Security
CountryChina
CityWuhan
Period23/05/0924/05/09

Fingerprint Dive into the research topics of 'Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement And Its Enhancement'. Together they form a unique fingerprint.

Cite this