Cryptology ePrint Archive: Report 2007/081

Revisiting an Efficient Elliptic Curve Key Agreement Protocol

Maurizio Adriano Strangio

Abstract: A recent paper by Wang \emph{et al.} has revealed a vulnerability in the ECKE-1 key agreement protocol. In particular, contrary to the author's claims, protocol ECKE-1 is shown to be susceptible to a key-compromise impersonation attack. This attack was also independently pointed out by the author in another recent paper published in the EURASIP Journal on Embedded Systems. Here we present a revised version of the protocol, ECKE-1R, that is key-compromise impersonation resilient at the expense of a higher computational workload and communication complexity with respect to the original protocol ECKE-1.

Category / Keywords: cryptographic protocols /

Publication Info: elliptic curve cryptosystem

Date: received 1 Mar 2007, last revised 23 Apr 2007

Contact author: strangio at mat uniroma3 it

Available format(s): PDF | BibTeX Citation

Version: 20070423:161730 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]