메뉴 건너뛰기




Volumn 11, Issue 1, 2010, Pages 55-57

Cryptanalysis of security enhancement for a modified authenticated key agreement protocol

Author keywords

Cryptography; Information security; Key agreement; Key exchange; Password

Indexed keywords

AUTHENTICATED KEY AGREEMENT PROTOCOLS; INSECURE NETWORKS; KEY AGREEMENT; KEY EXCHANGE; OFFLINE PASSWORD GUESSING ATTACK; PASSWORD; REPLAY ATTACK; SECURITY ENHANCEMENTS;

EID: 80053096670     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Letter
Times cited : (18)

References (21)
  • 1
    • 77949553535 scopus 로고    scopus 로고
    • Cryptanalysis of two RFID authentication protocols
    • T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International Journal of Network Security, vol. 9, no. 1, pp. 95-100, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 95-100
    • Cao, T.1    Shen, P.2
  • 3
    • 73149095465 scopus 로고    scopus 로고
    • An authenticated key agreement protocol using conjugacy problem in braid groups
    • A. Chaturvedi and S. Lal, "An authenticated key agreement protocol using conjugacy problem in braid groups," International Journal of Network Security, vol. 6, no. 2, pp. 181-184, 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.2 , pp. 181-184
    • Chaturvedi, A.1    Lal, S.2
  • 4
    • 33748173666 scopus 로고    scopus 로고
    • Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement
    • K. K. R. Choo, "Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement," International Journal of Network Security, vol. 1, no. 3, pp. 154-160, 2005.
    • (2005) International Journal of Network Security , vol.1 , Issue.3 , pp. 154-160
    • Choo, K.K.R.1
  • 5
    • 84874914559 scopus 로고    scopus 로고
    • Revisiting Lee, Kim, & Yoo authenticated key agreement protocol
    • K. K. R. Choo, "Revisiting Lee, Kim, & Yoo authenticated key agreement protocol," International Journal of Network Security, vol. 2, no. 1, pp. 64-68, 2006.
    • (2006) International Journal of Network Security , vol.2 , Issue.1 , pp. 64-68
    • Choo, K.K.R.1
  • 7
    • 84875281333 scopus 로고    scopus 로고
    • Queue-based group key agreement protocol
    • S. Hong, "Queue-based group key agreement protocol," International Journal of Network Security, vol. 9, no. 2, pp. 135-142, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.2 , pp. 135-142
    • Hong, S.1
  • 8
    • 0038284947 scopus 로고    scopus 로고
    • Cryptanalysis of enhancement for simple authenticated key agreement algorithm
    • C. L. Hsu, T. S. Wu, T. C. Wu, and C. Mitchell, "Cryptanalysis of enhancement for simple authenticated key agreement algorithm," Applied Mathematics and Computation, vol. 142, no. 2-3, pp. 305-308, 2003.
    • (2003) Applied Mathematics and Computation , vol.142 , Issue.2-3 , pp. 305-308
    • Hsu, C.L.1    Wu, T.S.2    Wu, T.C.3    Mitchell, C.4
  • 9
    • 0037038584 scopus 로고    scopus 로고
    • Improved Yen-Joye's authenticated multiple-key agreement protocol
    • M. S. Hwang, C. W. Lin, and C. C. Lee, "Improved Yen-Joye's authenticated multiple-key agreement protocol," IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431, 2002.
    • (2002) IEE Electronics Letters , vol.38 , Issue.23 , pp. 1429-1431
    • Hwang, M.S.1    Lin, C.W.2    Lee, C.C.3
  • 10
    • 33646261491 scopus 로고    scopus 로고
    • Authenticated encryption schemes: Current status and key issues
    • M. S. Hwang and H. Y. Liu, "Authenticated encryption schemes: Current status and key issues," International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 61-73
    • Hwang, M.S.1    Liu, H.Y.2
  • 11
    • 73149093942 scopus 로고    scopus 로고
    • Effcient user authentication and key agreement with user privacy protection
    • W. S. Juang and J. L. Wu, "Effcient user authentication and key agreement with user privacy protection," International Journal of Network Security, vol. 7, no. 1, pp. 120-129, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 120-129
    • Juang, W.S.1    Wu, J.L.2
  • 12
    • 0034293729 scopus 로고    scopus 로고
    • Cryptanalysis of modiffed authenticated key agreement protocol
    • W. C. Ku and S. D. Wang, "Cryptanalysis of modiffed authenticated key agreement protocol," IEE Electronics Letters, vol. 36, no. 21, pp. 1770-1771, 2000.
    • (2000) IEE Electronics Letters , vol.36 , Issue.21 , pp. 1770-1771
    • Ku, W.C.1    Wang, S.D.2
  • 13
    • 0011637140 scopus 로고    scopus 로고
    • An improvement of a simple authenticated key agreement algorithm
    • Eric J. L. Lu and M. S. Hwang, "An improvement of a simple authenticated key agreement algorithm," Pakistan Journal of Applied Sciences, vol. 2, no. 1, pp. 64-65, 2002.
    • (2002) Pakistan Journal of Applied Sciences , vol.2 , Issue.1 , pp. 64-65
    • Lu, E.J.L.1    Hwang, M.S.2
  • 14
    • 33846349755 scopus 로고    scopus 로고
    • Authentication and key agreement protocols preserving anonymity
    • K. V. Mangipudi, R. S. Katti, and H. Fu, "Authentication and key agreement protocols preserving anonymity," International Journal of Network Security, vol. 3, no. 3, pp. 259-270, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.3 , pp. 259-270
    • Mangipudi, K.V.1    Katti, R.S.2    Fu, H.3
  • 15
    • 0032658583 scopus 로고    scopus 로고
    • Simple authenticated key agreement algorithm
    • D. Seo and P. Sweeney, "Simple authenticated key agreement algorithm," IEE Electronics Letters, vol. 35, no. 13, pp. 1073-1074, 1999.
    • (1999) IEE Electronics Letters , vol.35 , Issue.13 , pp. 1073-1074
    • Seo, D.1    Sweeney, P.2
  • 16
    • 78651063942 scopus 로고    scopus 로고
    • Effcient nonce-based authentication scheme for session initiation protocol
    • J. L. Tsai, "Effcient nonce-based authentication scheme for session initiation protocol," International Journal of Network Security, vol. 9, no. 1, pp. 12-16, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 12-16
    • Tsai, J.L.1
  • 17
    • 0033640351 scopus 로고    scopus 로고
    • Weakness in simple authenticated key agreement protocol
    • Y. M. Tseng, "Weakness in simple authenticated key agreement protocol," IEE Electronics Letters, vol. 36, no. 1, pp. 48-49, 2000.
    • (2000) IEE Electronics Letters , vol.36 , Issue.1 , pp. 48-49
    • Tseng, Y.M.1
  • 18
    • 70350453453 scopus 로고    scopus 로고
    • Effcient certiffcate-less authentication and key agreement (CL-AK) for grid computing
    • S. Wang, Z. Cao, and H. Bao, "Effcient certiffcate-less authentication and key agreement (CL-AK) for grid computing," International Journal of Network Security, vol. 7, no. 3, pp. 342-347, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.3 , pp. 342-347
    • Wang, S.1    Cao, Z.2    Bao, H.3
  • 19
    • 73149090428 scopus 로고    scopus 로고
    • Effcient identity-based authenticated key agreement protocol with PKG forward secrecy
    • S. Wang, Z. Cao, and F. Cao, "Effcient identity-based authenticated key agreement protocol with PKG forward secrecy," International Journal of Network Security, vol. 7, no. 2, pp. 181-186, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 181-186
    • Wang, S.1    Cao, Z.2    Cao, F.3
  • 20
    • 71649086263 scopus 로고    scopus 로고
    • Proof of forward security for password-based authenticated key exchange
    • S. Wu and Y. Zhu, "Proof of forward security for password-based authenticated key exchange," International Journal of Network Security, vol. 7, no. 3, pp. 335-341, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.3 , pp. 335-341
    • Wu, S.1    Zhu, Y.2
  • 21
    • 84875321481 scopus 로고    scopus 로고
    • An improvement on a three-party password-based key exchange protocol using weil pairing
    • Z. Yong, J. F. Ma, and S. J. Moon, "An improvement on a three-party password-based key exchange protocol using weil pairing," International Journal of Network Security, vol. 11, no. 1, pp. 14-19, 2010.
    • (2010) International Journal of Network Security , vol.11 , Issue.1 , pp. 14-19
    • Yong, Z.1    Ma, J.F.2    Moon, S.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.