Cryptanalysis of Biswas's Multi-party Keys Scheme Based on the Diffie-Hellman Technique
Authors
Hsieh-Tsen Pan, Jia-Rong Sun, Min-Shiang Hwang
Corresponding Author
Hsieh-Tsen Pan
Available Online April 2015.
- DOI
- 10.2991/ameii-15.2015.157How to use a DOI?
- Keywords
- Diffie-Hellman Key-exchange; Group Key; Man-in-the-middle Attack; Multiple two-party keys
- Abstract
Biswas proposed two protocols based on the two-party Diffie-Hellman technique: (1) key agreement with multiple two-party keys and (2) a contributory group key exchange protocol. Then, Tseng and Wu pointed out that the second protocol has a security weakness and proposed a new protocol to remedy the weakness. In this paper, the authors point out that the Biswas's first protocol is vulnerable to a man-in-the-middle attack. Through the attack, an attacker can intercept, modify, or delete the communicated messages between two communicating party or among the group members.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Hsieh-Tsen Pan AU - Jia-Rong Sun AU - Min-Shiang Hwang PY - 2015/04 DA - 2015/04 TI - Cryptanalysis of Biswas's Multi-party Keys Scheme Based on the Diffie-Hellman Technique BT - Proceedings of the International Conference on Advances in Mechanical Engineering and Industrial Informatics PB - Atlantis Press SP - 842 EP - 847 SN - 2352-5401 UR - https://doi.org/10.2991/ameii-15.2015.157 DO - 10.2991/ameii-15.2015.157 ID - Pan2015/04 ER -