The Risks of Compromising Secret Information

  • Authors:
  • Kyungah Shim

  • Affiliations:
  • -

  • Venue:
  • ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a taxonomy of known-key attacks on athenticated key agreement protocols, which is based on the adversaries' roles and objectives. The taxonomy is illustrated using new attacks on the Just-Vaudenay and Yacobi protocol. The taxonomy is used to discuss countermeasures and protocol analysis methods against known-key attacks.