Wireless Communications and Applications. First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers

Research Article

Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol

Download
271 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29157-9_40,
        author={Hui Zhang and Chunxiang Xu and Chengbang Li and Abdur Sangi},
        title={Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol},
        proceedings={Wireless Communications and Applications. First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers},
        proceedings_a={ICWCA},
        year={2012},
        month={5},
        keywords={},
        doi={10.1007/978-3-642-29157-9_40}
    }
    
  • Hui Zhang
    Chunxiang Xu
    Chengbang Li
    Abdur Sangi
    Year: 2012
    Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
    ICWCA
    Springer
    DOI: 10.1007/978-3-642-29157-9_40
Hui Zhang1,*, Chunxiang Xu1,*, Chengbang Li1,*, Abdur Sangi1
  • 1: University of Electronic Science and Technology of China
*Contact email: zzhui@yahoo.com.cn, chxxu@uestc.edu.cn, jeriffe@163.com

Abstract

Ratna Dutta and Rana Barua proposed a dynamic group key agreement protocol with constant round referred to as DGKA protocol. They claimed that the DGKA protocol is dynamic, efficient and provably secure under DDH assumption. In this paper, we analyze the security of the DGKA protocol and discovered its vulnerable nature towards two attacks. The first attack relates to the fact that this protocol does not satisfy the key independence property which is crucial for dynamic group key agreement protocol. The second one is an impersonation attack which demonstrates that the DGKA protocol is vulnerable to replay attacks.