Attacks on improved key distribution protocols with perfect reparability

Raphael C.W. Phan, Bok Min Goi

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two "attacks" described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all.

Original languageEnglish
Title of host publicationProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Pages595-599
Number of pages5
DOIs
Publication statusPublished - 2008
Externally publishedYes
EventIEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008 - Shanghai, China
Duration: 17 Dec 200820 Dec 2008
Conference number: 5th
https://ieeexplore.ieee.org/xpl/conhome/4755182/proceeding?isnumber=4756301 (Proceedings)

Publication series

NameProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Volume2

Conference

ConferenceIEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008
Abbreviated titleEUC 2008
Country/TerritoryChina
CityShanghai
Period17/12/0820/12/08
Internet address

Cite this