Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Enhanced of key agreement protocols resistant to a denial-of-service attack
Hwang M., Lo J., Liu C. Fundamenta Informaticae61 (3,4):389-398,2004.Type:Article
Date Reviewed: Feb 25 2005

The establishment of session keys for sending secret messages between an initiator and a responder is a well-studied field of research. Shoichi Hirose and Kanta Matsuura pointed out that techniques used for the authentication of these two parties might leave the responder vulnerable to a denial of service (DOS) attack by a malicious initiator. They proposed a solution that basically forces the initiator to do more computational work than the responder during the three-pass key-agreement (KA) protocol (for example, the falling together mechanism).

Hwang, Lo, and Liu propose enhancements to this KA protocol. They focus on “weak key validation,” a term not further defined in their study. They boldly claim that their enhancements avoid heavy computation, reduce bandwidth consumption, and make the protocol more efficient.

In fact, there are more data items contained in the three messages sent between parties in their proposed KAP-2 scheme than those in the Hirose-Matsuura protocol, indicating greater bandwidth consumption. It is also not clear that the responder has less computational work to do.

In order to make their work convincing, the authors need to explain these anomalies. Key terms must be defined, and stronger evidence than just sequence diagrams must be offered (namely, a simulation or formal proof). There are many instances of misspelled author names, typographical errors, improper use of words, and poor sentence structure that make this paper difficult to read.

Reviewer:  Douglas Howie Review #: CR130863 (0509-1015)
Bookmark and Share
 
Protocol Architecture (C.2.2 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Unauthorized Access (K.6.5 ... )
 
 
General (C.2.0 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Protocol Architecture": Date
Efficient at-most-once messages based on synchronized clocks
Liskov B., Shrira L., Wroclawski J. ACM Transactions on Computer Systems 9(2): 125-142, 1991. Type: Article
May 1 1992
Communications for cooperating systems
Cypser R., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1991. Type: Book (9780201507751)
Oct 1 1992
Data communications: the implications of communication systems for protocol design
Goldstein B., Jaffe J. IBM Systems Journal 26(1): 122-136, 1987. Type: Article
Feb 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy