In 2010, Guo and Zhang proposed a group key agreement protocol based on the chaotic hash function. This letter points out that Guo-Zhang's protocol is still vulnerable to off-line password guessing attacks, stolen-verifier attacks and reflection attacks.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Eun-Jun YOON, Kee-Young YOO, "Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function" in IEICE TRANSACTIONS on Information,
vol. E94-D, no. 11, pp. 2167-2170, November 2011, doi: 10.1587/transinf.E94.D.2167.
Abstract: In 2010, Guo and Zhang proposed a group key agreement protocol based on the chaotic hash function. This letter points out that Guo-Zhang's protocol is still vulnerable to off-line password guessing attacks, stolen-verifier attacks and reflection attacks.
URL: https://globals.ieice.org/en_transactions/information/10.1587/transinf.E94.D.2167/_p
Copy
@ARTICLE{e94-d_11_2167,
author={Eun-Jun YOON, Kee-Young YOO, },
journal={IEICE TRANSACTIONS on Information},
title={Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function},
year={2011},
volume={E94-D},
number={11},
pages={2167-2170},
abstract={In 2010, Guo and Zhang proposed a group key agreement protocol based on the chaotic hash function. This letter points out that Guo-Zhang's protocol is still vulnerable to off-line password guessing attacks, stolen-verifier attacks and reflection attacks.},
keywords={},
doi={10.1587/transinf.E94.D.2167},
ISSN={1745-1361},
month={November},}
Copy
TY - JOUR
TI - Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
T2 - IEICE TRANSACTIONS on Information
SP - 2167
EP - 2170
AU - Eun-Jun YOON
AU - Kee-Young YOO
PY - 2011
DO - 10.1587/transinf.E94.D.2167
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E94-D
IS - 11
JA - IEICE TRANSACTIONS on Information
Y1 - November 2011
AB - In 2010, Guo and Zhang proposed a group key agreement protocol based on the chaotic hash function. This letter points out that Guo-Zhang's protocol is still vulnerable to off-line password guessing attacks, stolen-verifier attacks and reflection attacks.
ER -