Skip to main content

Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications

  • Conference paper
International Joint Conference SOCO’13-CISIS’13-ICEUTE’13

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 239))

  • 2018 Accesses

Abstract

Recently, Antequera and López-Ramos have proposed an improvement on the secure multicast protocol based on the extended Euclidean algorithm in order to overcome the weaknesses and breaches detected by Peinado and Ortiz. The improvement defines a new authentication scheme based on the Chinese Remainder Theorem. However, we show in this work that the protocol is still vulnerable to impersonation attack due to the relationships between the authentication message of different multicast keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Applications of the Extended Euclidean Algorithm to Privacy and Secure Communications. In: Proc. of 10th International Conference on Computational and Mathematical Methods in Science and Engineering (2010)

    Google Scholar 

  2. Naranjo, J.A.M., López-Ramos, J.A., Casado, L.G.: Key Refreshment in overlay networks: a centralized secure multicast scheme proposal. In: XXI Jornadas de Paralelismo, Valencia, Spain, pp. 931–938 (2010)

    Google Scholar 

  3. Naranjo, J.Á.M., Ramos, J.A.L., Casado, L.G.: A Key Distribution scheme for Live Streaming Multi-tree Overlays. In: Herrero, Á., Corchado, E., Redondo, C., Alonso, Á. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol. 85, pp. 223–230. Springer, Heidelberg (2010)

    Google Scholar 

  4. Menezes, A., Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press (1996)

    Google Scholar 

  5. Peinado, A., Ortiz, A.: Cryptanalysis of Multicast protocols with Key Refreshment based on the Extended Euclidean Algorithm. In: Herrero, Á., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 177–182. Springer, Heidelberg (2011)

    Google Scholar 

  6. Peinado, A., Ortiz, A.: Cryptanalysis of a Key Refreshment Scheme for Multicast protocols by means of Genetic Algorithm. Logic Journal of the IGPL (August 2012), doi:10.1093/jigpal/jzs031

    Google Scholar 

  7. Antequera, N., López-Ramos, J.A.: Remarks and countermeasures on a cryptanalysis of a secure multicast protocol. In: Proc. 7th International Conference on Next Generation Web Services Practices, pp. 210–214 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Peinado .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Peinado, A., Ortiz, A., Cotrina, G. (2014). Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications. In: Herrero, Á., et al. International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-01854-6_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01854-6_52

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01853-9

  • Online ISBN: 978-3-319-01854-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics