Paper 2007/081

Revisiting an Efficient Elliptic Curve Key Agreement Protocol

Maurizio Adriano Strangio

Abstract

A recent paper by Wang \emph{et al.} has revealed a vulnerability in the ECKE-1 key agreement protocol. In particular, contrary to the author's claims, protocol ECKE-1 is shown to be susceptible to a key-compromise impersonation attack. This attack was also independently pointed out by the author in another recent paper published in the EURASIP Journal on Embedded Systems. Here we present a revised version of the protocol, ECKE-1R, that is key-compromise impersonation resilient at the expense of a higher computational workload and communication complexity with respect to the original protocol ECKE-1.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. elliptic curve cryptosystem
Contact author(s)
strangio @ mat uniroma3 it
History
2007-04-23: last of 3 revisions
2007-03-01: received
See all versions
Short URL
https://ia.cr/2007/081
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/081,
      author = {Maurizio Adriano Strangio},
      title = {Revisiting an Efficient Elliptic Curve Key Agreement Protocol},
      howpublished = {Cryptology ePrint Archive, Paper 2007/081},
      year = {2007},
      note = {\url{https://eprint.iacr.org/2007/081}},
      url = {https://eprint.iacr.org/2007/081}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.