Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol

  • Shengbao Wang
  • , Zhenfu Cao*
  • , Maurizio Adriano Strangio
  • , Lihua Wang
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

32 Scopus citations

Abstract

In SAC'05, Strangio proposed protocol ECKE- 1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication. In this letter, we show that protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We also present an improved protocol - ECKE-1N, which can withstand such attacks. The new protocol's performance is comparable to the well-known MQV protocol and maintains the same remarkable list of security properties.

Original languageEnglish
Pages (from-to)149-151
Number of pages3
JournalIEEE Communications Letters
Volume12
Issue number2
DOIs
StatePublished - Feb 2008
Externally publishedYes

Keywords

  • Diffie-Hellman protocol
  • Elliptic curve cryptography
  • Key agreement
  • Key-compromise impersonation
  • MQV

Fingerprint

Dive into the research topics of 'Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol'. Together they form a unique fingerprint.

Cite this