Abstract
Recently, Antequera and López-Ramos have proposed an improvement on the secure multicast protocol based on the extended Euclidean algorithm in order to overcome the weaknesses and breaches detected by Peinado and Ortiz. The improvement defines a new authentication scheme based on the Chinese Remainder Theorem. However, we show in this work that the protocol is still vulnerable to impersonation attack due to the relationships between the authentication message of different multicast keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Applications of the Extended Euclidean Algorithm to Privacy and Secure Communications. In: Proc. of 10th International Conference on Computational and Mathematical Methods in Science and Engineering (2010)
Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Key Refreshment in overlay networks: a centralized secure multicast scheme proposal. In: XXI Jornadas de Paralelismo, Valencia, Spain, pp. 931–938 (2010)
Naranjo, J.Á.M., Ramos, J.A.L., Casado, L.G.: A Key Distribution scheme for Live Streaming Multi-tree Overlays. In: Herrero, Á., Corchado, E., Redondo, C., Alonso, Á. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol. 85, pp. 223–230. Springer, Heidelberg (2010)
Menezes, A., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press (1996)
Peinado, A., Ortiz, A.: Cryptanalysis of Multicast protocols with Key Refreshment based on the Extended Euclidean Algorithm. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 177–182. Springer, Heidelberg (2011)
Peinado, A., Ortiz, A.: Cryptanalysis of a Key Refreshment Scheme for Multicast protocols by means of Genetic Algorithm. Logic Journal of the IGPL (August 2012), doi:10.1093/jigpal/jzs031
Antequera, N., López-Ramos, J.A.: Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proc. 7th International Conference on Next Generation Web Services Practices, pp. 210–214 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Peinado, A., Ortiz, A., Cotrina, G. (2014). Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications. In: Herrero, Á., et al. International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-01854-6_52
Download citation
DOI: https://doi.org/10.1007/978-3-319-01854-6_52
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01853-9
Online ISBN: 978-3-319-01854-6
eBook Packages: EngineeringEngineering (R0)