Title: Impersonation attack on CertificateLess key agreement protocol

Authors: Suman Bala; Gaurav Sharma; Anil K. Verma

Addresses: Amity School of Engineering and Technology, Amity University, Noida 201 301, India ' Amity School of Engineering, Amity University, Noida 201 301, India ' Computer Science and Engineering Department, Thapar University, Patiala 147004, India

Abstract: Key agreement is a fundamental activity to establish communication between two parties. Kim et al. (2013) proposed a CertificateLess two-party authenticated key agreement (CTAKA) protocol, which is secure in extended Canetti-Krawczyk (eCK) model. This paper describes the security flaw of Kim et al.'s CTAKA protocol, which is found vulnerable against Key-Compromise Impersonation (K-CI) attack. For the resistance of the attack in Kim et al.'s CTAKA protocol, a defensive measure has been proposed, which is secure in eCK model.

Keywords: CertificateLess cryptography; key agreement; cryptanalysis; CTAKA; CertificateLess two-party authenticated key agreement.

DOI: 10.1504/IJAHUC.2018.089580

International Journal of Ad Hoc and Ubiquitous Computing, 2018 Vol.27 No.2, pp.108 - 120

Received: 05 Jan 2015
Accepted: 20 Sep 2015

Published online: 31 Jan 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article