Abstract
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to preserve confidentiality and data integrity. Since Joux [6] initiates the development of tripartite key agreement protocol, many prominent tripartite schemes have been proposed subsequently. In 2005, Tso et al. [15] have proposed an ID-based non-interactive tripartite key agreement scheme with k-resilience. Based on this scheme, they have further proposed another one-round tripartite application scheme. Although they claimed that both schemes are efficient and secure, we discover that both schemes are in fact breakable. In this paper, we impose several impersonation attacks on Tso et al.’s schemes in order to highlight their flaws. Subsequently, we propose some applicable enhancements which will not only conquer their defects, but also preserve the security attributes of an ideal key agreement protocol.
This work was supported by University IT Research Center Project of MIC, Korea.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Al-Riyami, S.S., Paterson, K.G.: Tripartite Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive: Report (035) (2002)
Chien, H.Y.: Comments: Insider Attack on Cheng et al.’s Pairing-based Tripartite Key Agreement Protocols, Cryptology ePrint Archive: Report (013) (2005)
Chien, H.Y., Lin, R.Y.: An Improved Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing. Int. J. Appl. Sci. Eng. 3, 1 (2005)
Chou, J.S., Lin, C.H., Chiu, C.H.: Weakness of Shims New ID-based Tripartite Multiple-key Agreement Protocol, Cryptology ePrint Archive: Report (457) (2005)
Cheng, Z.H., Vasiu, L., Comley, R.: Pairing-based One-round Tripartite Key Agreement Protocols, Cryptology ePrint Archive: Report (079) (2004)
Joux, A.: A One-round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) Algorithmic Number Theory. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)
Lin, C.H., Li, H.H.: Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. In: AINA 2005. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pp. 135–138 (2005)
Lim, M.H., Lee, S.G., Park, Y.H., Lee, H.J.: An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol, Cryptology ePrint Archive: Report (142) (2007)
Nalla, D.: ID-based Tripartite Key Agreement with Signatures, Cryptology ePrint Archive: Report (144) (2003)
Nalla, D., Reddy, K.C.: ID-based tripartite Authenticated Key Agreement Protocols from pairings, Cryptology ePrint Archive: Report (004) (2003)
Shim, K.: Cryptanalysis of Al-Riyami-Paterson’s Authenticated Three Party Key Agreement Protocols, Cryptology ePrint Archive: Report (122) (2003)
Shim, K.: Efficient ID-based Authenticated Key Agreement Protocol based on Weil Pairing. Electronics Letters 39(8), 653–654 (2003)
Shim, K.: Efficient One-round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. Electronics Letters 39(2), 208–209 (2003)
Sun, H.M., Hsieh, B.T.: Security Analysis of Shims Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive: Report (113) (2003)
Tso, R., Okamoto, T., Takagi, T., Okamoto, E.: An ID-based Non-Interactive Tripartite Key Agreement Protocol with K-Resilience. Communications and Computer Networks, 38–42 (2005)
Wilson, S.B., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)
Wilson, S.B., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. (ed.) Cryptography and Coding. LNCS, vol. 1355, pp. 339–361. Springer, Heidelberg (1997)
Zhang, F.G., Liu, S.L., Kim, K.J.: ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings, Cryptology ePrint Archive: Report (122) (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, MH., Lee, S., Moon, S. (2007). Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol. In: McDaniel, P., Gupta, S.K. (eds) Information Systems Security. ICISS 2007. Lecture Notes in Computer Science, vol 4812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77086-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-77086-2_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77085-5
Online ISBN: 978-3-540-77086-2
eBook Packages: Computer ScienceComputer Science (R0)