By Topic

Challenge-Response Attack on a Key Transport Protocol based on a Ring Locking Technique

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Li Jia-Qi ; Coll. of Comput. Sci. & Technol., Southwest Univ. for Nat., Chengdu, China ; Yang Jun

Key transport is one of the fundamental issues in modern cryptography. Recently Khayat proposed a multiple agent distributed version of Shamir's 3-pass no-key protocol. In this paper, based on a ring locking technique a challenge-response attack on Khayat's protocol is mounted to capture its vulnerability to CCA1 and CCA2. The cryptanalysis shows that the attack protocol is efficient (without expensive on-line computation of modular inverses), scalable (independent of the size of trustees), and feasible on the Internet environment. One of its novel features is that the active attacker can conceal some trace of his cyber crime by means of the commutative property of index multiplication in iterative modular exponentiations.

Published in:

Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on

Date of Conference:

23-25 Aug. 2012