Paper 2024/1177

Cryptanalysis of two post-quantum authenticated key agreement protocols

Mehdi Abri, University of Isfahan
Hamid Mala, University of Isfahan
Abstract

As the use of the internet and digital devices has grown rapidly, keeping digital communications secure has become very important. Authenticated Key Agreement (AKA) protocols play a vital role in securing digital communications. These protocols enable the communicating parties to mutually authenticate and securely establish a shared secret key. The emergence of quantum computers makes many existing AKA protocols vulnerable to their immense computational power. Consequently, designing new protocols that are resistant to quantum attacks has become essential. Extensive research in this area had led to the design of several post-quantum AKA schemes. In this paper, we analyze two post-quantum AKA schemes proposed by Dharminder et al. [2022] and Pursharthi and Mishra. [2024] and demonstrate that these schemes are not secure against active adversaries. An adversary can impersonate an authorized user to the server. We then propose reliable solutions to prevent these attacks.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
AuthenticationKey agreementLattice-based cryptographyPost-quantum security
Contact author(s)
m8abri @ gmail com
h mala @ eng ui ac ir
History
2024-07-22: approved
2024-07-21: received
See all versions
Short URL
https://ia.cr/2024/1177
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1177,
      author = {Mehdi Abri and Hamid Mala},
      title = {Cryptanalysis of two post-quantum authenticated key agreement protocols},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1177},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1177}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.