Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols

The pairing-free ID-based authenticated key agreement ID-AKA protocol provides secure and efficient communication over the public network, which is introduced by Zhu et al. in 2007. Afterwards, a number of identity-based authenticated key agreement protocols have been proposed to meet a variety of desirable security and performance requirements. In this paper, we analyze Fiore and Gennaro's scheme and demonstrate key off-set and forgery attack. We identify that Farash and Attari's protocol is vulnerable to the forgery attack, key compromise impersonation attack, key off-set attack and known session key specific temporary information attack. We also show that Hou and Xu's scheme also fails to resist key off-set and forgery attack.

[1]  Liqun Chen,et al.  Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.

[2]  Nigel P. Smart,et al.  AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .

[3]  Mahmoud Ahmadian-Attari,et al.  An ID-based key agreement protocol based on ECC among users of separate networks , 2012, 2012 9th International ISC Conference on Information Security and Cryptology.

[4]  Sk Hafizul Islam,et al.  An improved pairing-free identity-based authenticated key agreement protocol based on ECC , 2012 .

[5]  Dengguo Feng,et al.  An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks , 2011, Comput. Commun..

[6]  Rosario Gennaro,et al.  Identity-Based Key Exchange Protocols without Pairings , 2010, Trans. Comput. Sci..

[7]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..

[8]  Serge Vaudenay,et al.  Authenticated Multi-Party Key Agreement , 1996, ASIACRYPT.

[9]  Guomin Yang,et al.  An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices , 2007, WINE.

[10]  Liqun Chen,et al.  Identity based authenticated key agreement protocols from pairings , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..

[11]  Meng-bo Hou,et al.  A one-round ID-based authenticated key agreement protocol with enhanced security , 2011, 2011 2nd International Conference on Intelligent Control and Information Processing.

[12]  Kwangjo Kim,et al.  Advances in Cryptology — ASIACRYPT '96 , 1996, Lecture Notes in Computer Science.