Paper 2023/889

A note on ``LAKAF: lightweight authentication and key agreement framework for smart grid network''

Zhengjun Cao
Lihua Liu
Abstract

We show that the key agreement scheme [J. Syst. Archit., 116: 102053, 2021] is flawed. It makes use of a symmetric key encryption to transfer data between the user and server. But the symmetric key is easily retrieved by an adversary, which results in the loss of data confidentiality, and makes it vulnerable to impersonation attack.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
AuthenticationKey agreementImpersonation attackSymmetric key encryptionSmart grid
Contact author(s)
liulh @ shmtu edu cn
History
2023-06-12: approved
2023-06-09: received
See all versions
Short URL
https://ia.cr/2023/889
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2023/889,
      author = {Zhengjun Cao and Lihua Liu},
      title = {A note on ``LAKAF: lightweight authentication and key agreement framework for smart grid network''},
      howpublished = {Cryptology ePrint Archive, Paper 2023/889},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/889}},
      url = {https://eprint.iacr.org/2023/889}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.