2017, 11(4): 715-717. doi: 10.3934/amc.2017052

An active attack on a distributed Group Key Exchange system

1. 

Department of Mathematics, University of Almeria, Ctra. Sacramento s/n, 04120 Almeria, Spain

2. 

Institute of Mathematics, University of Zurich, Winterthurerstrasse 190, 8057 Zurich, Switzerland

Received  March 2016 Published  November 2017

Fund Project: Second and fourth author are partially suppported by Ministerio de Economia y Competitividad grant MTM2014-54439 and Junta de Andalucia (FQM0211). Third author is partially supported by Armasuisse and Swiss National Science Foundation grant number 149716

In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.

Citation: Mohamed Baouch, Juan Antonio López-Ramos, Blas Torrecillas, Reto Schnyder. An active attack on a distributed Group Key Exchange system. Advances in Mathematics of Communications, 2017, 11 (4) : 715-717. doi: 10.3934/amc.2017052
References:
[1]

M. Burmester and I. Desmedt, A secure and efficient conference key distribution system, Lecture Notes in Comput. Sci., 950 (1995), 275-286.

[2]

M. Burmester and I. Desmedt, A secure and scalable Group Key Exchange system, Information Proc. Letters, 94 (2005), 137-143. doi: 10.1016/j.ipl.2005.01.003.

[3]

W. D. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22 (1976), 644-654.

[4]

P. P. C. LeeJ. C. S. Lui and D. K. Y. Yau, Distributed collaborative key agreement and authentication protocols for dynamic peer Groups, IEEE/ACM Trans. Networking, 14 (2006), 263-276. doi: 10.1109/TNET.2006.872575.

[5]

R. SchnyderJ. A. Lopez-RamosJ. Rosenthal and D. Schipani, An active attack on a multiparty key exchange protocol, Journal of Algebra Combinatorics Discrete Structures and Applications, 3 (2016), 31-36.

[6]

M. SteinerG. Tsudik and M. Waidner, Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM Conference on Computer and Communications Security, (1996), 31-37. doi: 10.1145/238168.238182.

[7]

M. SteinerG. Tsudik and M. Waidner, Key agreement in dynamic peer groups, IEEE Transactions of Parallel and Distributed Systems, 11 (2000), 769-780. doi: 10.1109/71.877936.

[8]

J. Van der Merwe, D. Dawoud and S. McDonald, A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, 39 (2007). doi: 10.1145/1216370.1216371.

[9]

S. -H. Yang, Wireless Sensor Networks. Principles, Desing and Applications, Springer-Verlag, London, 2014.

show all references

References:
[1]

M. Burmester and I. Desmedt, A secure and efficient conference key distribution system, Lecture Notes in Comput. Sci., 950 (1995), 275-286.

[2]

M. Burmester and I. Desmedt, A secure and scalable Group Key Exchange system, Information Proc. Letters, 94 (2005), 137-143. doi: 10.1016/j.ipl.2005.01.003.

[3]

W. D. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22 (1976), 644-654.

[4]

P. P. C. LeeJ. C. S. Lui and D. K. Y. Yau, Distributed collaborative key agreement and authentication protocols for dynamic peer Groups, IEEE/ACM Trans. Networking, 14 (2006), 263-276. doi: 10.1109/TNET.2006.872575.

[5]

R. SchnyderJ. A. Lopez-RamosJ. Rosenthal and D. Schipani, An active attack on a multiparty key exchange protocol, Journal of Algebra Combinatorics Discrete Structures and Applications, 3 (2016), 31-36.

[6]

M. SteinerG. Tsudik and M. Waidner, Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM Conference on Computer and Communications Security, (1996), 31-37. doi: 10.1145/238168.238182.

[7]

M. SteinerG. Tsudik and M. Waidner, Key agreement in dynamic peer groups, IEEE Transactions of Parallel and Distributed Systems, 11 (2000), 769-780. doi: 10.1109/71.877936.

[8]

J. Van der Merwe, D. Dawoud and S. McDonald, A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, 39 (2007). doi: 10.1145/1216370.1216371.

[9]

S. -H. Yang, Wireless Sensor Networks. Principles, Desing and Applications, Springer-Verlag, London, 2014.

[1]

Giacomo Micheli. Cryptanalysis of a noncommutative key exchange protocol. Advances in Mathematics of Communications, 2015, 9 (2) : 247-253. doi: 10.3934/amc.2015.9.247

[2]

Mohammad Sadeq Dousti, Rasool Jalili. FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. Advances in Mathematics of Communications, 2015, 9 (4) : 471-514. doi: 10.3934/amc.2015.9.471

[3]

Shigeki Akiyama, Edmund Harriss. Pentagonal domain exchange. Discrete & Continuous Dynamical Systems - A, 2013, 33 (10) : 4375-4400. doi: 10.3934/dcds.2013.33.4375

[4]

Hayden Schaeffer. Active arcs and contours. Inverse Problems & Imaging, 2014, 8 (3) : 845-863. doi: 10.3934/ipi.2014.8.845

[5]

Yvo Desmedt, Niels Duif, Henk van Tilborg, Huaxiong Wang. Bounds and constructions for key distribution schemes. Advances in Mathematics of Communications, 2009, 3 (3) : 273-293. doi: 10.3934/amc.2009.3.273

[6]

Carlos Gutierrez, Simon Lloyd, Vladislav Medvedev, Benito Pires, Evgeny Zhuzhoma. Transitive circle exchange transformations with flips. Discrete & Continuous Dynamical Systems - A, 2010, 26 (1) : 251-263. doi: 10.3934/dcds.2010.26.251

[7]

Ivan Dynnikov, Alexandra Skripchenko. Minimality of interval exchange transformations with restrictions. Journal of Modern Dynamics, 2017, 11: 219-248. doi: 10.3934/jmd.2017010

[8]

Mohammad T. Manzari, Charles S. Peskin. Paradoxical waves and active mechanism in the cochlea. Discrete & Continuous Dynamical Systems - A, 2016, 36 (8) : 4531-4552. doi: 10.3934/dcds.2016.36.4531

[9]

Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281-305. doi: 10.3934/amc.2010.4.281

[10]

Rainer Steinwandt, Adriana Suárez Corona. Attribute-based group key establishment. Advances in Mathematics of Communications, 2010, 4 (3) : 381-398. doi: 10.3934/amc.2010.4.381

[11]

Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489

[12]

Z. Reichstein and B. Youssin. Parusinski's "Key Lemma" via algebraic geometry. Electronic Research Announcements, 1999, 5: 136-145.

[13]

Andrei Korobeinikov. Global properties of a general predator-prey model with non-symmetric attack and consumption rate. Discrete & Continuous Dynamical Systems - B, 2010, 14 (3) : 1095-1103. doi: 10.3934/dcdsb.2010.14.1095

[14]

Edward S. Canepa, Alexandre M. Bayen, Christian G. Claudel. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming. Networks & Heterogeneous Media, 2013, 8 (3) : 783-802. doi: 10.3934/nhm.2013.8.783

[15]

Christopher F. Novak. Discontinuity-growth of interval-exchange maps. Journal of Modern Dynamics, 2009, 3 (3) : 379-405. doi: 10.3934/jmd.2009.3.379

[16]

Christopher K. R. T. Jones, Siu-Kei Tin. Generalized exchange lemmas and orbits heteroclinic to invariant manifolds. Discrete & Continuous Dynamical Systems - S, 2009, 2 (4) : 967-1023. doi: 10.3934/dcdss.2009.2.967

[17]

Luca Marchese. The Khinchin Theorem for interval-exchange transformations. Journal of Modern Dynamics, 2011, 5 (1) : 123-183. doi: 10.3934/jmd.2011.5.123

[18]

Jon Chaika. Hausdorff dimension for ergodic measures of interval exchange transformations. Journal of Modern Dynamics, 2008, 2 (3) : 457-464. doi: 10.3934/jmd.2008.2.457

[19]

Sarbaz H. A. Khoshnaw. Reduction of a kinetic model of active export of importins. Conference Publications, 2015, 2015 (special) : 705-722. doi: 10.3934/proc.2015.0705

[20]

Nicolas Lermé, François Malgouyres, Dominique Hamoir, Emmanuelle Thouin. Bayesian image restoration for mosaic active imaging. Inverse Problems & Imaging, 2014, 8 (3) : 733-760. doi: 10.3934/ipi.2014.8.733

2016 Impact Factor: 0.8

Metrics

  • PDF downloads (8)
  • HTML views (79)
  • Cited by (0)

[Back to Top]