International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Revisiting an Efficient Elliptic Curve Key Agreement Protocol

Authors:
Maurizio Adriano Strangio
Download:
URL: http://eprint.iacr.org/2007/081
Search ePrint
Search Google
Abstract: A recent paper by Wang \emph{et al.} has revealed a vulnerability in the ECKE-1 key agreement protocol. In particular, contrary to the author's claims, protocol ECKE-1 is shown to be susceptible to a key-compromise impersonation attack. This attack was also independently pointed out by the author in another recent paper published in the EURASIP Journal on Embedded Systems. Here we present a revised version of the protocol, ECKE-1R, that is key-compromise impersonation resilient at the expense of a higher computational workload and communication complexity with respect to the original protocol ECKE-1.
BibTeX
@misc{eprint-2007-13363,
  title={Revisiting an Efficient Elliptic Curve Key Agreement Protocol},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols /},
  url={http://eprint.iacr.org/2007/081},
  note={elliptic curve cryptosystem strangio@mat.uniroma3.it 13626 received 1 Mar 2007, last revised 23 Apr 2007},
  author={Maurizio Adriano Strangio},
  year=2007
}