Cryptology ePrint Archive: Report 2010/473
Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
Hui Zhang and Chunxiang Xu and Abdur Rashid Sangi
Abstract: Ratna Dutta and Rana Barua proposed a dynamic group key agreement protocol with constant round referred to as DGKA protocol. They claimed that the DGKA protocol is dynamic, efficient and provably secure under DDH assumption. In this paper, we analyze the security of the DGKA protocol and discovered its vulnerable nature towards two attacks. The first attack relates to the fact that this protocol does not satisfy the key independence property which is crucial for dynamic group key agreement protocol. The second one is an impersonation attack which demonstrates that the DGKA protocol is vulnerable to replay attacks.
Category / Keywords: attack, group key agreement, dynamic, impersonation
Publication Info: The paper has been removed by the editors.
Date: received 6 Sep 2010, last revised 16 Sep 2010, withdrawn 8 Dec 2010
Contact author: zzhui at yahoo com cn
Available format(s): (-- withdrawn --)
Version: 20101208:191707 (All versions of this report)
Short URL: ia.cr/2010/473
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]