1. Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem
- Author
-
Dheeb Albashish, Ahmad Abusukhon, Mohammed Lafi, Zeyad Mohammad, Jaffar Atwan, and Ahmad Alkhatib
- Subjects
Authentication ,business.industry ,Computer science ,Cryptography ,Man-in-the-middle attack ,Computer security ,computer.software_genre ,law.invention ,Random oracle ,Authenticated Key Exchange ,law ,Key (cryptography) ,Cryptanalysis ,business ,computer ,Protocol (object-oriented programming) - Abstract
Authenticated key exchange protocols are a fundamental cryptography building block for establishing a secret shared key among participating parties over an open network model. Mohamed et al. proposed a tightly-secure authenticated key exchange without NAXOS approach based on decision linear problem in order to solve an open problem for designing an authenticated key exchange protocol without using NAXOS trick. Mohamed et al.'s protocol has tight security proof in the eCK model under the random oracle problem and its security claims verified by using the games sequence tool. However, we show that Mohamed et al.’s protocol cannot withstand the key compromise impersonation attacks and man in the middle attacks. Furthermore, Mohamed et al.'s protocol cannot provide an implicit entity authentication property since it is a basic security property for an authenticated key exchange protocol. Therefore, the protocol is not secure in the eCK model.
- Published
- 2021
- Full Text
- View/download PDF