Abstract
An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is sufficient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference key agreement protocols.
Preview
Unable to display preview. Download preview PDF.
References
S. Bakhtiari, R. Safavi-Naini and J. Pieprzyk, “Keyed Hash Functons, Cryptography: Policy and Algorithms, Springer-Verlag, LNCS 1029, pp.210–214, 1996.
T. Berson, L. Gong and M. Lomas, “Secure, Keyed and Collisionful Hash Function”, Technical Report, SRI International, September 1994.
C. Boyd, “Towards a Classification of Key Agreement Protocols”, IEEE Computer Security Foundations Workshop, pp.38–43, IEEE Press 1995.
M. Burmester and Y. Desmedt, “A Secure and Efficient Conference Key Distribution System”, Advances in Cryptology — Eurocrypt 94, Springer-Verlag, 1995, pp.275–286.
W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, IT-22, 6, pp. 644–654, 1976.
I. Ingemarsson, D. Tang and C. Wong, “A Conference Key Distribution Scheme”, IEEE Transactions on Information Theory, IT-28, 5, September 1982, pp. 714–720.
M. Just and S. Vaudenay, “Authenticated Multi-Party Key Agreement”, Advances in Cryptology — Asiacrypt 96, Springer-Verlag, 1996, pp.26–35.
B. Klein, M. Otten and T. Beth, “Conference Key Distribution Protocols in Distributed Systems”, Codes and Cyphers — Cryptography and Coding IV, IMA, 1995, pp.225–242.
B. Preneel and P. van Oorschot, “MDx-MAC and Building Fast MACs from Hash Functions”, Advances in Cryptology — Crypto '95, Springer-Verlag, 1995, pp.1–14.
M. Rabin, “Digitalized Signatures and Public-Key Functions as Intractable as Factorization”, MIT Laboratory for Computer Science, 1979.
R. Rueppel and P. van Oorschot, “Modern Key Agreement Techniques”, Computer Communications, July 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Boyd, C. (1997). On key agreement and conference key agreement. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027936
Download citation
DOI: https://doi.org/10.1007/BFb0027936
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive