Impersonation Attacks on Key Agreement Protocols Resistant to Denial of Service Attacks

Kyung-Ah SHIM  

Publication
IEICE TRANSACTIONS on Information and Systems   Vol.E89-D   No.7   pp.2306-2309
Publication Date: 2006/07/01
Online ISSN: 1745-1361
DOI: 10.1093/ietisy/e89-d.7.2306
Print ISSN: 0916-8532
Type of Manuscript: LETTER
Category: Application Information Security
Keyword: 
authenticated key agreement protocol,  impersonation attack,  denial-of-service attack,  

Full Text: PDF(73KB)>>
Buy this Article




Summary: 
Hirose and Yoshida proposed an authenticated key agreement protocol based on the intractability of the Computational Diffie-Hellman problem. Recently, Hirose and Matsuura pointed out that Hirose and Yoshida's protocol is vulnerable to Denial-of-Service (DoS) attacks. And they proposed two key agreement protocols which are resistant to the DoS attacks. Their protocols are the first authenticated key agreement protocols resistant to both the storage exhaustion attack and the CPU exhaustion attack. In this paper we show that Hirose and Matsuura's DoS-resistant key agreement protocols and Hirose and Yoshida's key agreement protocol are vulnerable to impersonation attacks. We make suggestions for improvements.