Security analysis on a conference scheme for mobile communications

The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually obtain low power and limited computing capability. In this paper we study a conference scheme for mobile communications and find that the scheme is insecure against the replay attack. With our replay attack, an attacker with a compromised conference key can cause the conferees to reuse the compromised conference key, which in turn completely reveals subsequent conversation content

[1]  Wei-Pang Yang,et al.  Conference Key Distribution Schemes for Secure Digital Mobile Communications , 1995, IEEE J. Sel. Areas Commun..

[2]  Siaw-Lynn Ng Comments on "Dynamic participation in a secure conference scheme for mobile communications" , 2001, IEEE Trans. Veh. Technol..

[3]  Jim Alves-Foss,et al.  On Preventing Replay Attacks on Security Protocols , 2002 .

[4]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[5]  Chin-Chen Chang,et al.  A self-encryption mechanism for authentication of roaming and teleconference services , 2003, IEEE Trans. Wirel. Commun..

[6]  Min-Shiang Hwang Dynamic participation in a secure conference scheme for mobile communications , 1999 .

[7]  Paul F. Syverson On key distribution protocols for repeated authentication , 1993, OPSR.

[8]  Chee Kheong Siew,et al.  A secure and efficient conference scheme for mobile communications , 2003, IEEE Trans. Veh. Technol..

[9]  Natsume Matsuzaki,et al.  Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.

[10]  Wei-Chi Ku,et al.  Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol , 2003, OPSR.

[11]  Yiming Ye,et al.  A secure conference scheme for mobile communications , 2003, IEEE Trans. Wirel. Commun..

[12]  Kaoru Kurosawa,et al.  On Key Distribution and Authentication in Mobile Radio Networks , 1994, EUROCRYPT.

[13]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[14]  Tuomas Aura,et al.  Strategies against replay attacks , 1997, Proceedings 10th Computer Security Foundations Workshop.

[15]  Feng Bao Analysis of a Conference Scheme Under Active and Passive Attacks , 2004, ACISP.

[16]  William A. Arbaugh,et al.  An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .

[17]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[18]  Chris J. Mitchell,et al.  Comments on the S/KEY user authentication scheme , 1996, OPSR.