Attacks on an ISO/IEC 11770-2 key establishment protocol

Article


Comley, R. and Cheng, Z. 2005. Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security. 3 (3), pp. 290-295.
TypeArticle
TitleAttacks on an ISO/IEC 11770-2 key establishment protocol
AuthorsComley, R. and Cheng, Z.
Abstract

This paper demonstrates that two types of serious attack (replay and type) are possible on an ISO/IEC server-based key establishment protocol. The flaw is associated with the method used to ensure the freshness of an established key. Two possible solutions are proposed to deal with the identified weakness. This is of great potential impact and as a result of this work, ISO published a technical corrigendum (ISO/IEC 11770-2:1996/Cor 1:2005) to remove the protocol from ISO/IEC 11770-2: 1996.

PublisherFemto Technique Co. Ltd
JournalInternational Journal of Network Security
ISSN1816-353X
Publication dates
Print10 Jul 2005
Publication process dates
Deposited13 Oct 2008
Output statusPublished
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/80qxz

Restricted files

Publisher's version

  • 29
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as