Premium
Security analysis of an authentication and key agreement protocol for satellite communications
Author(s) -
Zhang Yuanyuan,
Chen Jianhua,
Huang Baojun
Publication year - 2014
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.2612
Subject(s) - computer science , denial of service attack , computer security , session key , adversary , authentication (law) , computer network , authentication protocol , key (lock) , key agreement protocol , protocol (science) , scheme (mathematics) , reflection attack , session (web analytics) , security analysis , replay attack , challenge–response authentication , public key cryptography , key distribution , world wide web , the internet , encryption , medicine , mathematical analysis , mathematics , pathology , alternative medicine
SUMMARY Recently, Chang et al . proposed an authentication and key agreement protocol for satellite communications, and they claimed that their scheme could withstand various attacks. However, in this paper, we will show that their scheme is vulnerable to the denial of service attack and the impersonation attack. Moreover, we also point out that the adversary could compute the session key through the intercepted message. The analysis shows the scheme of Chang et al . is not secure for practical applications. Copyright © 2013 John Wiley & Sons, Ltd.