메뉴 건너뛰기




Volumn 178, Issue 1, 2008, Pages 220-229

Three weaknesses in a simple three-party key exchange protocol

Author keywords

Authenticated key exchange; Impersonation attack; Man in the middle attack; Password; Provable security

Indexed keywords

AUTHENTICATION; COMPUTER CRIME; SECURITY OF DATA;

EID: 34948903343     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2007.08.004     Document Type: Article
Times cited : (83)

References (17)
  • 1
    • 24144443144 scopus 로고    scopus 로고
    • M. Abdalla, D. Pointcheval, Simple password-based encrypted key exchange protocols, in: Proc. CT-RSA'05, LNCS, vol. 3376, 2005, pp. 191-208.
  • 2
    • 0027726717 scopus 로고    scopus 로고
    • M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: Proc. First ACM Annual Conference on Computer and Communications Security, 1993, pp. 62-73.
  • 3
    • 84945119254 scopus 로고    scopus 로고
    • M. Bellare, P. Rogaway, Entity authentication and key distribution, in: Proc. Crypto'93, LNCS, vol. 773, 1993, pp. 232-249.
  • 4
    • 34948832877 scopus 로고    scopus 로고
    • M. Bellare, P. Rogaway, Provably secure session key distribution: the three party case, in: Proc. 27th ACM Symposium on the Theory of Computing, 1995, pp. 57-66.
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • M. Bellare, P. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Proc. Eurocrypt'00, LNCS, vol. 1807, 2000, pp. 139-155.
  • 6
    • 0026850091 scopus 로고    scopus 로고
    • S.M. Bellovin, M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, in: Proc. 1992 IEEE Symposium on Research in Security and Privacy, 1992, pp. 72-84.
  • 7
    • 34447321042 scopus 로고    scopus 로고
    • EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
    • 10.1016/j.ins.2007.03.024
    • Byun J.W., Lee D.H., and Lim J.I. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Information Sciences (2007) 10.1016/j.ins.2007.03.024
    • (2007) Information Sciences
    • Byun, J.W.1    Lee, D.H.2    Lim, J.I.3
  • 8
    • 18444399366 scopus 로고    scopus 로고
    • Simple authenticated key agreement and protected password change protocol
    • Chang T.Y., Yang W.P., and Hwang M.S. Simple authenticated key agreement and protected password change protocol. Computers and Mathematics with Applications 49 5-6 (2005) 703-714
    • (2005) Computers and Mathematics with Applications , vol.49 , Issue.5-6 , pp. 703-714
    • Chang, T.Y.1    Yang, W.P.2    Hwang, M.S.3
  • 9
    • 33747171940 scopus 로고    scopus 로고
    • The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
    • Choo K.-K.R., Boyd C., and Hitchcock Y. The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Computer Communications 29 15 (2006) 2788-2797
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2788-2797
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 10
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computers Security 23 7 (2004) 571-577
    • (2004) Computers Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 11
    • 10444279176 scopus 로고    scopus 로고
    • Provably secure three-party password-authenticated key exchange, IEICE Transactions on Fundamentals of Electronics
    • Lin C.L., Wen H.A., Hwang T., and Sun H.M. Provably secure three-party password-authenticated key exchange, IEICE Transactions on Fundamentals of Electronics. Communications and Computer Sciences E87-A 11 (2004) 2990-3000
    • (2004) Communications and Computer Sciences , vol.E87-A , Issue.11 , pp. 2990-3000
    • Lin, C.L.1    Wen, H.A.2    Hwang, T.3    Sun, H.M.4
  • 12
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R., and Cao Z. Simple three-party key exchange protocol. Computers Security 26 1 (2007) 94-97
    • (2007) Computers Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.1    Cao, Z.2
  • 13
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 14
    • 34548667976 scopus 로고    scopus 로고
    • Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
    • 10.1016/j.ins.2007.06.002
    • Nam J., Paik J., Kim U.M., and Won D. Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. Information Sciences (2007) 10.1016/j.ins.2007.06.002
    • (2007) Information Sciences
    • Nam, J.1    Paik, J.2    Kim, U.M.3    Won, D.4
  • 15
    • 33751229614 scopus 로고    scopus 로고
    • Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
    • Shim K., and Woo S.S. Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. Information Sciences 177 4 (2007) 1143-1151
    • (2007) Information Sciences , vol.177 , Issue.4 , pp. 1143-1151
    • Shim, K.1    Woo, S.S.2
  • 16
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
    • Wen H.A., Lee T.F., and Hwang T. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proceedings - Communications 152 2 (2005) 138-143
    • (2005) IEE Proceedings - Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 17
    • 33644748254 scopus 로고    scopus 로고
    • Provably secure authenticated key exchange protocols for low power computing clients
    • Wen H.A., Lin C.L., and Hwang T. Provably secure authenticated key exchange protocols for low power computing clients. Computers Security 25 2 (2006) 106-113
    • (2006) Computers Security , vol.25 , Issue.2 , pp. 106-113
    • Wen, H.A.1    Lin, C.L.2    Hwang, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.