• Jun 13, 2017 News!The submission for 2018 7th International Conference on Information and Electronics Engineering (ICIEE 2018) is officially open now !   [Click]
  • Oct 20, 2017 News!IJIEE Vol. 7, No. 6 issue has been published online!   [Click]
  • Sep 28, 2017 News!IJIEE Vol. 7, No. 5 issue has been published online!   [Click]
General Information
Editor-in-chief

 
Faculty of Science, University of Brunei Darussalam, Brunei Darussalam   
" It is a great honor to serve as the editor-in-chief of IJIEE. I'll work together with the editorial team. Hopefully, IJIEE will be recognized among the readers in the related field."
IJIEE 2012 Vol.2(5): 810-812 ISSN: 2010-3719
DOI: 10.7763/IJIEE.2012.V2.213

On the Feasibility of Key Compromise Impersonation Attacks against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

Maurizio Adriano Strangio
Abstract— In a recent conference (ICSSSM 2010), Eun-Jun Yooni and Kee-Young proposed the two-pass elliptic curve Diffie-Hellman key agreement protocol EECKE-1N that according to the authors is more efficient that ECKE-1N. In this paper we point out that the protocol proposed by the aforementioned authors is in fact the elliptic curve version of the MTI/C0 family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack.

Index Terms— Key agreement protocols, elliptic curves, key-compromise impersonation.

M. A. Strangio is with the Department of Mathematics, University of Rome “Roma Tre” (e-mail: strangio@mat.uniroma3.it).

[PDF]

Cite: Maurizio Adriano Strangio, "On the Feasibility of Key Compromise Impersonation Attacks against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol," International Journal of Information and Electronics Engineering vol. 2, no. 5, pp. 810-812, 2012.

Copyright © 2008-2017. International Journal of Information and Electronics Engineering. All rights reserved.
E-mail: ijiee@ejournal.net