In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.
Citation: |
[1] | M. Burmester and I. Desmedt, A secure and efficient conference key distribution system, Lecture Notes in Comput. Sci., 950 (1995), 275-286. |
[2] | M. Burmester and I. Desmedt, A secure and scalable Group Key Exchange system, Information Proc. Letters, 94 (2005), 137-143. doi: 10.1016/j.ipl.2005.01.003. |
[3] | W. D. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22 (1976), 644-654. |
[4] | P. P. C. Lee, J. C. S. Lui and D. K. Y. Yau, Distributed collaborative key agreement and authentication protocols for dynamic peer Groups, IEEE/ACM Trans. Networking, 14 (2006), 263-276. doi: 10.1109/TNET.2006.872575. |
[5] | R. Schnyder, J. A. Lopez-Ramos, J. Rosenthal and D. Schipani, An active attack on a multiparty key exchange protocol, Journal of Algebra Combinatorics Discrete Structures and Applications, 3 (2016), 31-36. |
[6] | M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM Conference on Computer and Communications Security, (1996), 31-37. doi: 10.1145/238168.238182. |
[7] | M. Steiner, G. Tsudik and M. Waidner, Key agreement in dynamic peer groups, IEEE Transactions of Parallel and Distributed Systems, 11 (2000), 769-780. doi: 10.1109/71.877936. |
[8] | J. Van der Merwe, D. Dawoud and S. McDonald, A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, 39 (2007). doi: 10.1145/1216370.1216371. |
[9] | S. -H. Yang, Wireless Sensor Networks. Principles, Desing and Applications, Springer-Verlag, London, 2014. |