Security weakness in ren et al.'s group key agreement scheme built on secure two-party protocols

  • Authors:
  • Junghyun Nam;Seungjoo Kim;Dongho Won

  • Affiliations:
  • School of Information and Communication Engineering, Sungkyunkwan University, Republic of Korea;School of Information and Communication Engineering, Sungkyunkwan University, Republic of Korea;School of Information and Communication Engineering, Sungkyunkwan University, Republic of Korea

  • Venue:
  • WISA'05 Proceedings of the 6th international conference on Information Security Applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.