Paper 2023/889
A note on ``LAKAF: lightweight authentication and key agreement framework for smart grid network''
Abstract
We show that the key agreement scheme [J. Syst. Archit., 116: 102053, 2021] is flawed. It makes use of a symmetric key encryption to transfer data between the user and server. But the symmetric key is easily retrieved by an adversary, which results in the loss of data confidentiality, and makes it vulnerable to impersonation attack.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- AuthenticationKey agreementImpersonation attackSymmetric key encryptionSmart grid
- Contact author(s)
- liulh @ shmtu edu cn
- History
- 2023-06-12: approved
- 2023-06-09: received
- See all versions
- Short URL
- https://ia.cr/2023/889
- License
-
CC0
BibTeX
@misc{cryptoeprint:2023/889, author = {Zhengjun Cao and Lihua Liu}, title = {A note on ``{LAKAF}: lightweight authentication and key agreement framework for smart grid network''}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/889}, year = {2023}, url = {https://eprint.iacr.org/2023/889} }