Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol

作者: Simon Blake-Wilson , Alfred Menezes

DOI: 10.1007/3-540-49162-7_12

关键词:

摘要: This paper presents some new unknown key-share attacks on STS-MAC, the version of STS key agreement protocol which uses a MAC algorithm to provide confirmation. Various methods are considered for preventing attacks.

参考文章(22)
Chris J. Mitchell, Andy Thomas, Standardising Authentication Protocols Based on Public-Key Techniques. Journal of Computer Security. ,vol. 2, pp. 23- 36 ,(1993)
M. O. Rabin, DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION MIT Laboratory for Computer Science. ,(1979)
Simon Blake-Wilson, Don Johnson, Alfred Menezes, Key Agreement Protocols and Their Security Analysis Lecture Notes in Computer Science. pp. 30- 45 ,(1997) , 10.1007/BFB0024447
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Chae Hoon Lim, Pil Joong Lee, A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp international cryptology conference. pp. 249- 263 ,(1997) , 10.1007/BFB0052240
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Mihir Bellare, Ran Canetti, Hugo Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) symposium on the theory of computing. pp. 419- 428 ,(1998) , 10.1145/276698.276854
S. Pohlig, M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) IEEE Transactions on Information Theory. ,vol. 24, pp. 106- 110 ,(1978) , 10.1109/TIT.1978.1055817
Simon Blake-Wilson, Alfred Menezes, Authenticated Diffie-Hellman Key Agreement Protocols selected areas in cryptography. pp. 339- 361 ,(1998) , 10.1007/3-540-48892-8_26
Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener, Authentication and authenticated key exchanges Designs, Codes and Cryptography. ,vol. 2, pp. 107- 125 ,(1992) , 10.1007/BF00124891