Abstract

Multiple key agreement (MKA) protocols allow two parties to generate two or more session keys in a run, which will be used for future secure communications in public network. In recent years, many MKA protocols have been proposed. However, most of them do not consider ephemeral key compromise resilience and also suffer from other security flaws. In this paper, we analyze Dehkordi and Alimoradi's MKA protocol and Tan's MKA protocol. We will present ephemeral key compromise attack against Dehkordi and Alimoradi's MKA protocol, and prove that Tan's MKA protocol cannot provide mutual security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call