<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf17401</article-id><article-id pub-id-type="doi">10.15388/Informatica.2006.149</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>On the Security Analysis of Lee, Hwang &amp; Lee (2004) and Song &amp; Kim (2000) Key Exchange / Agreement Protocols<xref ref-type="fn" rid="fn1"><sup>✩</sup></xref></article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Choo</surname><given-names>Kim-Kwang Raymond</given-names></name><email xlink:href="mailto:raymond.choo@aic.gov.au">raymond.choo@aic.gov.au</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Australian Institute of Criminology, GPO Box 2944, Canberra ACT 2601, Australia</aff></contrib-group><author-notes><fn id="fn1"><label><sup>✩</sup></label><p>The views and opinions expressed in this paper do not necessarily reflect those of the Commonwealth Government, the Minister for Justice and Customs, or the Australian Institute of Criminology. Research was performed while the author was with the Information Security Institute / Queensland University of Technology.</p></fn></author-notes><pub-date pub-type="epub"><day>01</day><month>01</month><year>2006</year></pub-date><volume>17</volume><issue>4</issue><fpage>467</fpage><lpage>480</lpage><history><date date-type="received"><day>01</day><month>05</month><year>2005</year></date></history><abstract><p>We revisit the password-based group key exchange protocol due to Lee et al. (2004), which carries a claimed proof of security in the Bresson et al. model under the intractability of the Decisional Diffie–Hellman problem (DDH) and Computational Diffie–Hellman (CDH) problem. We reveal a previously unpublished flaw in the protocol and its proof, whereby we demonstrate that the protocol violates the definition of security in the model. To provide a better insight into the protocol and proof failures, we present a fixed protocol. We hope our analysis will enable similar mistakes to be avoided in the future. We also revisit protocol 4 of Song and Kim (2000), and reveal a previously unpublished flaw in the protocol (i.e., a reflection attack).</p></abstract><kwd-group><label>Keywords</label><kwd>password-based key establishment protocols</kwd><kwd>key agreement protocols</kwd><kwd>provable security</kwd><kwd>information security</kwd></kwd-group></article-meta></front></article>