Back to Search Start Over

Member Tampering Attack on Burmester-Desmedt Group Key Exchange Protocol and Its Countermeasure

Authors :
Da-Zhi Sun
Yangguang Tian
Source :
Mathematics, Vol 10, Iss 19, p 3685 (2022)
Publication Year :
2022
Publisher :
MDPI AG, 2022.

Abstract

With the rapid development of cloud computing and mobile networks, more and more application scenarios require a secret group key for secure communication. Group Key Exchange (GKE) protocol provides a secret group key for three or more members. Burmester and Desmedt presented an influential GKE protocol, which has a broadcast version and a cyclic version. In this paper, we investigate the security weaknesses of the Burmester-Desmedt protocol. We report that both the broadcast version and the cyclic version of the Burmester-Desmedt protocol suffer member tampering attacks if the two members that belong to both group A and group B are corrupted. That is, two corrupted members can add some unknowing members of group A to group B and trick the legal members of group B to believe that these unknowing members share the secret group key with them after a protocol run. Furthermore, to defeat the member tampering attack, we propose digital signature-based improvements on the broadcast version and the cyclic version of the Burmester-Desmedt protocol. We hope our research results will encourage the development of more robust and effective GKE protocols that stand rigorous security analysis.

Details

Language :
English
ISSN :
10193685 and 22277390
Volume :
10
Issue :
19
Database :
Directory of Open Access Journals
Journal :
Mathematics
Publication Type :
Academic Journal
Accession number :
edsdoj.4a29d761eea643c6bbec8f17e881de98
Document Type :
article
Full Text :
https://doi.org/10.3390/math10193685