2017
DOI: 10.3390/cryptography1010009
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols

Abstract: Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC-based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vulnerabilities and to enhance them to be more secure against threats. This work demonstrates how currently-used ECC-based protocols are vulnerable to attacks. If protocols are vulnerable, damage could include critical data loss and elevated privacy concerns. The prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…However, this procedure is susceptible to man-in-the-middle (MIM) attack. 21 The research in Suresh and Hegadi 22,23 focused on the IoT environment. Dual cryptography architecturesecure network communication (D-SN) is a data security method that uses DNA genes sequence for encryption with RSA and Data Encryption Standard (DES).…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, this procedure is susceptible to man-in-the-middle (MIM) attack. 21 The research in Suresh and Hegadi 22,23 focused on the IoT environment. Dual cryptography architecturesecure network communication (D-SN) is a data security method that uses DNA genes sequence for encryption with RSA and Data Encryption Standard (DES).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore a generator point is shared only between the devices connected to communicate. This concept is implemented in the ECC primitive protocols [21], [23].…”
Section: Novel Elliptic Curve Cryptography Protocolmentioning
confidence: 99%
“…By simulating a clogging attack [1–5], an adversary forces a communicating entity to process a forged/replayed authentication request by the adversary impersonating on behalf of a legitimate entity. The clogging attack represents a significant class of denial of services (DoS) attack and quality of services (QoS) degradation attack [3–6].…”
mentioning
confidence: 99%
“…By simulating a clogging attack [1–5], an adversary forces a communicating entity to process a forged/replayed authentication request by the adversary impersonating on behalf of a legitimate entity. The clogging attack represents a significant class of denial of services (DoS) attack and quality of services (QoS) degradation attack [3–6]. The clogging attack can be launched through the replay of old messages and get these accepted as legitimate and fresh ones from the receiving entity or adversary can try to construct a forged message, which can pass authentication requests from the receiving entity [6].…”
mentioning
confidence: 99%