2015
DOI: 10.1002/sec.1373
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a robust key agreement based on public key authentication

Abstract: This paper considers security analysis of the YAK, a public key-based authenticated key agreement protocol. The YAK protocol is a variant of the two-pass HMQV protocol but uses zero-knowledge proofs for proving knowledge of ephemeral values. In this paper, we show that the YAK protocol lacks joint key control and perfect forward secrecy attributes and is vulnerable to some attacks including unknown key-share and key-replication attacks. This invalidates the semantic security of the protocol in several security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 34 publications
0
9
0
1
Order By: Relevance
“…We describe some desirable security properties of AKA protocol; for further details in the security properties of AKA, see previous studies 25,26, 28, 36, 40–47 PFS Resilience (PFS‐R) : If an eavesdropper might reveal any possible pairs of secret information without both private keys (static and ephemeral secret keys) owned by the party, it should not have any effect on the secrecy of previously established session keys. UKS : If party trueA^ wants to establish a secret key with trueB^, it should not be possible that trueB^ is tricked into sharing a key with party trueC^. Key control (KC) : Both of the parties should not be able to force the session key to a preselected value of their choice. Private key security : An adversary cannot learn the initiator's static private key even if she or he is able to learn all transient secrets in any of the initiator's session. Key confirmation : It is a guarantee exactly that the responder party trueB^ owns the same computed session key of the initiator party trueA^ in the same session.…”
Section: The Security Models and The Proposed Ecke Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…We describe some desirable security properties of AKA protocol; for further details in the security properties of AKA, see previous studies 25,26, 28, 36, 40–47 PFS Resilience (PFS‐R) : If an eavesdropper might reveal any possible pairs of secret information without both private keys (static and ephemeral secret keys) owned by the party, it should not have any effect on the secrecy of previously established session keys. UKS : If party trueA^ wants to establish a secret key with trueB^, it should not be possible that trueB^ is tricked into sharing a key with party trueC^. Key control (KC) : Both of the parties should not be able to force the session key to a preselected value of their choice. Private key security : An adversary cannot learn the initiator's static private key even if she or he is able to learn all transient secrets in any of the initiator's session. Key confirmation : It is a guarantee exactly that the responder party trueB^ owns the same computed session key of the initiator party trueA^ in the same session.…”
Section: The Security Models and The Proposed Ecke Modelmentioning
confidence: 99%
“…As a consequence, the total computation cost of the improved YAK protocol is five exponentiations as the original YAK protocol. However, the YAK protocol cannot withstand SSA attacks, 28 therefore making our proposed protocol more efficient than the original YAK protocol.…”
Section: The Improvement Of the Yak Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Desired security attributes and valid attacks are typically defined through the security models. Many protocols have been proposed over the years, and many of those protocols have security problems [24][25][26].…”
Section: Introductionmentioning
confidence: 99%