2021
DOI: 10.1002/sat.1417
|View full text |Cite
|
Sign up to set email alerts
|

Learning with error‐based key agreement and authentication scheme for satellite communication

Abstract: Satellite communication is one of the essential communication mechanisms that can be used for significant distance and under circumstances where the other communication mechanisms cannot work. Therefore, the security of this communication method is highly needed. Because in this era where information plays an important role, information security becomes the first priority for everyone. When we talk about information security, the key exchange and authentication are two key factors of information security. Whit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 19 publications
(29 citation statements)
references
References 21 publications
0
28
0
1
Order By: Relevance
“…We have observed how Kumar and Garg 18 is vulnerable to signal leakage attack. The signal leakage attack is applicable due to (1) NCA server keeps long term private/public key pair in ring learning with errors key exchange environment, and (2) NCA server is using the value aui provided by user (see Figure 2) in the Chfalse(.false) function as input that results wni=Chfalse(Knifalse)=Chfalse(aui.sfalse)=Chfalse(k.sfalse).…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…We have observed how Kumar and Garg 18 is vulnerable to signal leakage attack. The signal leakage attack is applicable due to (1) NCA server keeps long term private/public key pair in ring learning with errors key exchange environment, and (2) NCA server is using the value aui provided by user (see Figure 2) in the Chfalse(.false) function as input that results wni=Chfalse(Knifalse)=Chfalse(aui.sfalse)=Chfalse(k.sfalse).…”
Section: Discussionmentioning
confidence: 99%
“…Although Kumar and Garg 18 has proposed a quantum attack‐resistant protocol (see Figure 2) for satellite communication system, it cannot resist stolen smart card attack using differential power analysis attack described in He et al 19 and Chen and Chen 15 . This is very easy due to low entropy of identity and password; one can find hfalse(idifalse|false|pwifalse)Ei=a from the stored value in the smart card, then find Ai=hfalse(afalse|false|idifalse|false|pwifalse), then AiCi=Bi, where Ci can be obtained from card, then opponent checks the validity by Di=hfalse(Bifalse|false|Aifalse|false|idifalse) holds or not (refer Chen and Chen 15 ).…”
Section: Motivation and Contributionmentioning
confidence: 99%
See 3 more Smart Citations