DeepAI AI Chat
Log In Sign Up

The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure

03/14/2018
by   Chris J Mitchell, et al.
0

A significant security vulnerability in a recently published group key establishment protocol is described. This vulnerability allows a malicious insider to fraudulently establish a group key with an innocent victim, with the key chosen by the attacker. This shortcoming is sufficiently serious that the protocol should not be used.

READ FULL TEXT

page 1

page 2

page 3

page 4

03/03/2018

Security issues in a group key establishment protocol

Major shortcomings in a recently published group key establishment proto...
09/19/2020

An insecure noninteractive group key establishment scheme

A serious weakness in the recently proposed Chen-Hsu-Harn group authenti...
07/20/2018

TCP SYN Cookie Vulnerability

TCP SYN Cookies were implemented to mitigate against DoS attacks. It ens...
03/01/2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions

In this paper, we show how practical the little theorem of witness funct...
08/14/2023

Secure and Dynamic Publish/Subscribe: LCMsec

We propose LCMsec, a brokerless, decentralised Publish/Subscribe protoco...
07/27/2019

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

There can be performance and vulnerability concerns with block ciphers, ...
02/25/2020

CAKE: An Efficient Group Key Management for Dynamic Groups

With rapid increase of mobile computing and wireless network linkage, th...