The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure

03/14/2018
by   Chris J Mitchell, et al.
0

A significant security vulnerability in a recently published group key establishment protocol is described. This vulnerability allows a malicious insider to fraudulently establish a group key with an innocent victim, with the key chosen by the attacker. This shortcoming is sufficiently serious that the protocol should not be used.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/03/2018

Security issues in a group key establishment protocol

Major shortcomings in a recently published group key establishment proto...
research
09/19/2020

An insecure noninteractive group key establishment scheme

A serious weakness in the recently proposed Chen-Hsu-Harn group authenti...
research
07/20/2018

TCP SYN Cookie Vulnerability

TCP SYN Cookies were implemented to mitigate against DoS attacks. It ens...
research
03/01/2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions

In this paper, we show how practical the little theorem of witness funct...
research
08/14/2023

Secure and Dynamic Publish/Subscribe: LCMsec

We propose LCMsec, a brokerless, decentralised Publish/Subscribe protoco...
research
07/27/2019

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

There can be performance and vulnerability concerns with block ciphers, ...
research
02/25/2020

CAKE: An Efficient Group Key Management for Dynamic Groups

With rapid increase of mobile computing and wireless network linkage, th...

Please sign up or login with your details

Forgot password? Click here to reset