Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol

Recently, Chang et al. proposed a security enhancement in Ku and Wang's authenticated key agreement protocol. Two parties employ the pre-shared password to agreement a common session key via insecure network. However, in this article, we will show that Chang et al.'s scheme is suffer from the backward replay attack and the off-line password guessing attack.

[1]  Jia Lun Tsai Efficient Nonce-based Authentication Scheme for Session Initiation Protocol , 2009, Int. J. Netw. Secur..

[2]  Tianjie Cao,et al.  Cryptanalysis of Two RFID Authentication Protocols , 2009, Int. J. Netw. Secur..

[3]  Sheng-De Wang,et al.  Cryptanalysis of modified authenticated key agreement protocol , 2000 .

[4]  Huirong Fu,et al.  Authentication and Key Agreement Protocols Preserving Anonymity , 2006, Int. J. Netw. Secur..

[5]  Jianfeng Ma,et al.  An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing , 2010, Int. J. Netw. Secur..

[6]  Yuh-Min Tseng Weakness in simple authenticated key agreement protocol , 2000 .

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Sunghyuck Hong Queue-based Group Key Agreement Protocol , 2009, Int. J. Netw. Secur..

[9]  Min-Shiang Hwang,et al.  Authenticated Encryption Schemes: Current Status and Key Issues , 2005, Int. J. Netw. Secur..

[10]  Cheng-Chi Lee,et al.  Improved Yen-Joye's authenticated multiple-key agreement protocol , 2002 .

[11]  Peter Sweeney,et al.  Simple authenticated key agreement algorithm , 1999 .

[12]  Kim-Kwang Raymond Choo Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol , 2006, Int. J. Netw. Secur..

[13]  Kim-Kwang Raymond Choo Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols , 2004, Int. J. Netw. Secur..

[14]  Hung-Min Sun,et al.  Cryptanalysis of enhancement for simple authentication key agreement algorithm , 2002 .

[15]  Atul Chaturvedi,et al.  An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups , 2008, Int. J. Netw. Secur..

[16]  Zhenfu Cao,et al.  Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..

[17]  Zhenfu Cao,et al.  Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy , 2008, Int. J. Netw. Secur..

[18]  Wen-Shenq Juang,et al.  Efficient User Authentication and Key Agreement with User Privacy Protection , 2008, Int. J. Netw. Secur..

[19]  Yuefei Zhu,et al.  Proof of Forward Security for Password-based Authenticated Key Exchange , 2008, Int. J. Netw. Secur..

[20]  Min-Shiang Hwang,et al.  An Improvement of a Simple Authenticated Key Agreement Algorithm , 2002 .