[Resource Topic] 2007/081: Revisiting an Efficient Elliptic Curve Key Agreement Protocol

Welcome to the resource topic for 2007/081

Title:
Revisiting an Efficient Elliptic Curve Key Agreement Protocol

Authors: Maurizio Adriano Strangio

Abstract:

A recent paper by Wang \emph{et al.} has revealed a vulnerability in the ECKE-1 key agreement protocol. In particular, contrary to the author’s claims, protocol ECKE-1 is shown to be susceptible to a key-compromise impersonation attack. This attack was also independently pointed out by the author in another recent paper published in the EURASIP Journal on Embedded Systems. Here we present a revised version of the protocol, ECKE-1R, that is key-compromise impersonation resilient at the expense of a higher computational workload and communication complexity with respect to the original protocol ECKE-1.

ePrint: https://eprint.iacr.org/2007/081

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .