Efficient three-party key exchange protocols with round efficiency
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Youn, Taek-Young | - |
dc.contributor.author | Kang, Eun Sook | - |
dc.contributor.author | Lee, Changhoon | - |
dc.date.accessioned | 2021-09-06T04:49:58Z | - |
dc.date.available | 2021-09-06T04:49:58Z | - |
dc.date.created | 2021-06-14 | - |
dc.date.issued | 2013-02 | - |
dc.identifier.issn | 1018-4864 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/104103 | - |
dc.description.abstract | Recently, Guo et al. discovered some security flaws of the simple three-party key exchange protocol proposed by Lu and Cao, and proposed an improved protocol. Independently, Chung and Ku also showed some weaknesses of Lu and Cao's protocol, and provided an improved protocol. In this paper, we review some insecurity of Lu and Cao's protocol and analyze two improved protocols proposed by Guo et al. and Chung and Ku. Then we show that the protocols are still insecure. They are vulnerable to an adversary who performs an off-line password guessing attack. We provide a countermeasure by performing detailed analysis on the security flaws in two improved protocols. We also propose a secure three-party password-authenticated key exchange protocol which requires three rounds. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Efficient three-party key exchange protocols with round efficiency | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kang, Eun Sook | - |
dc.identifier.doi | 10.1007/s11235-011-9649-3 | - |
dc.identifier.scopusid | 2-s2.0-84879602205 | - |
dc.identifier.wosid | 000320781900087 | - |
dc.identifier.bibliographicCitation | TELECOMMUNICATION SYSTEMS, v.52, no.2, pp.1367 - 1376 | - |
dc.relation.isPartOf | TELECOMMUNICATION SYSTEMS | - |
dc.citation.title | TELECOMMUNICATION SYSTEMS | - |
dc.citation.volume | 52 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 1367 | - |
dc.citation.endPage | 1376 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Cryptanalysis | - |
dc.subject.keywordAuthor | Password | - |
dc.subject.keywordAuthor | Key exchange | - |
dc.subject.keywordAuthor | Three-party setting | - |
dc.subject.keywordAuthor | Password guessing attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.