Paper 2007/081
Revisiting an Efficient Elliptic Curve Key Agreement Protocol
Maurizio Adriano Strangio
Abstract
A recent paper by Wang \emph{et al.} has revealed a vulnerability in the ECKE-1 key agreement protocol. In particular, contrary to the author's claims, protocol ECKE-1 is shown to be susceptible to a key-compromise impersonation attack. This attack was also independently pointed out by the author in another recent paper published in the EURASIP Journal on Embedded Systems. Here we present a revised version of the protocol, ECKE-1R, that is key-compromise impersonation resilient at the expense of a higher computational workload and communication complexity with respect to the original protocol ECKE-1.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. elliptic curve cryptosystem
- Contact author(s)
- strangio @ mat uniroma3 it
- History
- 2007-04-23: last of 3 revisions
- 2007-03-01: received
- See all versions
- Short URL
- https://ia.cr/2007/081
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2007/081, author = {Maurizio Adriano Strangio}, title = {Revisiting an Efficient Elliptic Curve Key Agreement Protocol}, howpublished = {Cryptology {ePrint} Archive, Paper 2007/081}, year = {2007}, url = {https://eprint.iacr.org/2007/081} }