• Mar 31, 2016 News!Vol.5, No.5 has been indexed by EI (Inspec).   [Click]
  • Aug 02, 2016 News!IJIEE Vol. 6, No. 4 issue has been published online! 10 papers which cover 3 specific areas are published in this issue.   [Click]
  • May 10, 2016 News!Papers published in Vol.6, No.3 have all received dois from Crossref.
General Information
Editor-in-chief

 
Faculty of Science, University of Brunei Darussalam, Brunei Darussalam   
" It is a great honor to serve as the editor-in-chief of IJIEE. I'll work together with the editorial team. Hopefully, IJIEE will be recognized among the readers in the related field."
IJIEE 2012 Vol.2(5): 810-812 ISSN: 2010-3719
DOI: 10.7763/IJIEE.2012.V2.213

On the Feasibility of Key Compromise Impersonation Attacks against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

Maurizio Adriano Strangio
Abstract— In a recent conference (ICSSSM 2010), Eun-Jun Yooni and Kee-Young proposed the two-pass elliptic curve Diffie-Hellman key agreement protocol EECKE-1N that according to the authors is more efficient that ECKE-1N. In this paper we point out that the protocol proposed by the aforementioned authors is in fact the elliptic curve version of the MTI/C0 family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack.

Index Terms— Key agreement protocols, elliptic curves, key-compromise impersonation.

M. A. Strangio is with the Department of Mathematics, University of Rome “Roma Tre” (e-mail: strangio@mat.uniroma3.it).

[PDF]

Cite: Maurizio Adriano Strangio, "On the Feasibility of Key Compromise Impersonation Attacks against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol," International Journal of Information and Electronics Engineering vol. 2, no. 5, pp. 810-812, 2012.

Copyright © 2008-2016. International Journal of Information and Electronics Engineering. All rights reserved.
E-mail: ijiee@ejournal.net