Sciweavers

Share
CTRSA
2006
Springer

Session Corruption Attack and Improvements on Encryption Based MT-Authenticators

11 years 12 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of practical attackers but also provides a modular approach to the design of secure key exchange protocols. One important element in this approach is the MTauthenticator. An MT-authenticator transforms a message transmission protocol for an ideally authenticated network to an equivalent protocol for a real, unauthenticated network such that all attacks that can be launched in the unauthenticated network can also be launched in the authenticated network. In this paper, we show that the proof of the encryption-based MT-authenticator proposed in their paper is flawed, which leads to their encryption-based MT-authenticator insecure. An attack called session corruption attack can be launched successfully against the MT-authenticator in the unauthenticated network but not against the corresponding message transmission prot...
Xiaojian Tian, Duncan S. Wong
Added 22 Aug 2010
Updated 22 Aug 2010
Type Conference
Year 2006
Where CTRSA
Authors Xiaojian Tian, Duncan S. Wong
Comments (0)
books