eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.
You are looking at a specific version 20101208:191707 of this paper. See the latest version.

Paper 2010/473

Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol

Hui Zhang and Chunxiang Xu and Abdur Rashid Sangi

Abstract

Ratna Dutta and Rana Barua proposed a dynamic group key agreement protocol with constant round referred to as DGKA protocol. They claimed that the DGKA protocol is dynamic, efficient and provably secure under DDH assumption. In this paper, we analyze the security of the DGKA protocol and discovered its vulnerable nature towards two attacks. The first attack relates to the fact that this protocol does not satisfy the key independence property which is crucial for dynamic group key agreement protocol. The second one is an impersonation attack which demonstrates that the DGKA protocol is vulnerable to replay attacks.

Metadata
Available format(s)
-- withdrawn --
Publication info
Published elsewhere. The paper has been removed by the editors.
Keywords
attackgroup key agreementdynamicimpersonation
Contact author(s)
zzhui @ yahoo com cn
History
2010-12-08: withdrawn
2010-09-08: received
See all versions
Short URL
https://ia.cr/2010/473
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.