The Risks of Compromising Secret Information

This paper presents a taxonomy of known-key attacks on athenticated key agreement protocols, which is based on the adversaries’ roles and objectives. The taxonomy is illustrated using new attacks on the Just-Vaudenay and Yacobi protocol. The taxonomy is used to discuss countermeasures and protocol a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Shim, Kyungah
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper presents a taxonomy of known-key attacks on athenticated key agreement protocols, which is based on the adversaries’ roles and objectives. The taxonomy is illustrated using new attacks on the Just-Vaudenay and Yacobi protocol. The taxonomy is used to discuss countermeasures and protocol analysis methods against known-key attacks.
ISSN:0302-9743
1611-3349
DOI:10.1007/3-540-36159-6_11