Paper 2024/1177
Cryptanalysis of two post-quantum authenticated key agreement protocols
Abstract
As the use of the internet and digital devices has grown rapidly, keeping digital communications secure has become very important. Authenticated Key Agreement (AKA) protocols play a vital role in securing digital communications. These protocols enable the communicating parties to mutually authenticate and securely establish a shared secret key. The emergence of quantum computers makes many existing AKA protocols vulnerable to their immense computational power. Consequently, designing new protocols that are resistant to quantum attacks has become essential. Extensive research in this area had led to the design of several post-quantum AKA schemes. In this paper, we analyze two post-quantum AKA schemes proposed by Dharminder et al. [2022] and Pursharthi and Mishra. [2024] and demonstrate that these schemes are not secure against active adversaries. An adversary can impersonate an authorized user to the server. We then propose reliable solutions to prevent these attacks.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- AuthenticationKey agreementLattice-based cryptographyPost-quantum security
- Contact author(s)
-
m8abri @ gmail com
h mala @ eng ui ac ir - History
- 2024-07-22: approved
- 2024-07-21: received
- See all versions
- Short URL
- https://ia.cr/2024/1177
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1177, author = {Mehdi Abri and Hamid Mala}, title = {Cryptanalysis of two post-quantum authenticated key agreement protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1177}, year = {2024}, url = {https://eprint.iacr.org/2024/1177} }