Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On diffie-hellman key agreement with short exponents
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Public-key encryption in a multi-user setting: security proofs and improvements
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves
Proceedings of the 2005 ACM symposium on Applied computing
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Information Sciences: an International Journal
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Information Sciences: an International Journal
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A Provably Secure One-Pass Two-Party Key Establishment Protocol
Information Security and Cryptology
A Critical Analysis and Improvement of AACS Drive-Host Authentication
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
A critical analysis and improvement of advanced access content system drive-host authentication
International Journal of Applied Cryptography
Certified Encryption Revisited
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
A closer look at PKI: security and efficiency
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Security analysis of the authentication modules of Chinese WLAN standard and its implementation plan
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Information Sciences: an International Journal
Modeling leakage of ephemeral secrets in tripartite/group key exchange
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Security improvement on a group key exchange protocol for mobile networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
Toward pairing-free certificateless authenticated key exchanges
ISC'11 Proceedings of the 14th international conference on Information security
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
On the importance of public-key validation in the MQV and HMQV key agreement protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Authenticated key agreement without subgroup element verification
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Errors in computational complexity proofs for protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
About the security of MTI/C0 and MQV
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A new key exchange protocol based on MQV assuming public computations
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Authenticated key exchange under bad randomness
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Comments on the SM2 key exchange protocol
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
New identity-based three-party authenticated key agreement protocol with provable security
Journal of Network and Computer Applications
OAKE: a new family of implicitly authenticated diffie-hellman protocols
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
Journal of Medical Systems
Hi-index | 0.00 |
The MQV key agreement protocol, a technique included in recent standards, is shown in its basic form to be vulnerable to an unknown key-share attack. Although the attack's practical impact on security is minimal---a key confirmation step easily prevents it---the attack is noteworthy in the principles it illustrates about protocol design. First, minor "e;efficiency improvements"e; can significantly alter the security properties of a protocol. Second, protocol analysis must consider potential interactions with all parties, not just those that are normally online. Finally, attacks must be assessed in terms of system requirements, not just in isolation.