Attacks on an ISO/IEC 11770-2 key establishment protocol
Article
Comley, R. and Cheng, Z. 2005. Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security. 3 (3), pp. 290-295.
Type | Article |
---|---|
Title | Attacks on an ISO/IEC 11770-2 key establishment protocol |
Authors | Comley, R. and Cheng, Z. |
Abstract | This paper demonstrates that two types of serious attack (replay and type) are possible on an ISO/IEC server-based key establishment protocol. The flaw is associated with the method used to ensure the freshness of an established key. Two possible solutions are proposed to deal with the identified weakness. This is of great potential impact and as a result of this work, ISO published a technical corrigendum (ISO/IEC 11770-2:1996/Cor 1:2005) to remove the protocol from ISO/IEC 11770-2: 1996. |
Publisher | Femto Technique Co. Ltd |
Journal | International Journal of Network Security |
ISSN | 1816-353X |
Publication dates | |
10 Jul 2005 | |
Publication process dates | |
Deposited | 13 Oct 2008 |
Output status | Published |
Language | English |
Permalink -
https://repository.mdx.ac.uk/item/80qxz
Restricted files
Publisher's version
Under embargo indefinitely
29
total views0
total downloads0
views this month0
downloads this month