Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.

Similar presentations


Presentation on theme: "1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20."— Presentation transcript:

1 1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20

2 2 Outline  Introduction  Review of Hwang et al.’s protocol  Attack  Conclusions

3 3 Introduction (1)  Diffie-Hellman key agreement protocol  Man in middle attack  Authentication key exchange protocol  Perfect forward secrecy

4 4 Introduction (2) 2004 Hwang-Chang- Lin-Tsai 2005 This paper 1998 Harn and Lin Based on Diffie-Hellman 2001 Harn and Lin Multiple common session key 2003 Hwang, Shiau and Lai Using XOR Perfect forward secrecy High computation cost Forgery signature attack

5 5 Review of Hwang et al.’s protocol  Notations  Step 1 -- Alice computes  Step 2 -- Bob verifies Alice and computes  Step 3 -- Alice verifies Bob  Multiple common session keys

6 6 Notations p : a large prime chosen by system g : a primitive root in GF(p) : long-term private key chosen by Alice and Bob respectively, and associative public keys and certificates are

7 7 Step 1 AliceBob

8 8 Step 2 AliceBob

9 9 Step 3 Alice

10 10 Multiple common session keys

11 11 Attack Eve does the following steps to impersonate Alice and agree session key with Bob Step 1 Step 2 Step 3

12 12 Step 1  The adversary Eve randomly chooses t and computes

13 13 Step 2  When Bob receives the message, he verifies the message by the following equation :

14 14 Step 3  The adversary can compute two of the session key Computed by Eve

15 15 Conclusions  In this paper, we show that Hwang- Chang-Lin-Tsai protocol is vulnerable to forgery signature attack.  To find an efficient and secure authentication key exchange protocol deserves future work.

16 16 Thanks!


Download ppt "1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20."

Similar presentations


Ads by Google