Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient three-party key exchange protocols with round efficiency

Authors
Youn, Taek-YoungKang, Eun SookLee, Changhoon
Issue Date
Feb-2013
Publisher
SPRINGER
Keywords
Cryptanalysis; Password; Key exchange; Three-party setting; Password guessing attack
Citation
TELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1367 - 1376
Indexed
SCIE
SCOPUS
Journal Title
TELECOMMUNICATION SYSTEMS
Volume
52
Number
2
Start Page
1367
End Page
1376
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/104103
DOI
10.1007/s11235-011-9649-3
ISSN
1018-4864
Abstract
Recently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of AI Cyber Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE