IACR News item: 12 June 2023
Zhengjun Cao, Lihua Liu
ePrint Report
We show that the key agreement scheme [J. Syst. Archit., 116: 102053, 2021] is flawed. It makes use of a symmetric key encryption to transfer data between the user and server. But the symmetric key is easily retrieved by an adversary, which results in the loss of data confidentiality, and makes it vulnerable to impersonation attack.
Additional news items may be found on the IACR news page.