Weakness in a RSA-based password authenticated key exchange protocol
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Youn, Taek-Young | - |
dc.contributor.author | Park, Young-Ho | - |
dc.contributor.author | Kim, Changhan | - |
dc.contributor.author | Lim, Jongin | - |
dc.date.accessioned | 2021-09-09T02:19:03Z | - |
dc.date.available | 2021-09-09T02:19:03Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2008-11-30 | - |
dc.identifier.issn | 0020-0190 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/122375 | - |
dc.description.abstract | Recently. an efficient password-authenticated key exchange protocol based on RSA has been proposed by Park et al. with formal security proof. In this letter, we analyze their protocol, and show that, unfortunately, it is insecure against an adversary who performs a dictionary attack. (C) 2008 Published by Elsevier B.V. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.subject | IMBALANCED WIRELESS NETWORKS | - |
dc.subject | ATTACKS | - |
dc.subject | SECURE | - |
dc.title | Weakness in a RSA-based password authenticated key exchange protocol | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lim, Jongin | - |
dc.identifier.doi | 10.1016/j.ipl.2008.06.002 | - |
dc.identifier.scopusid | 2-s2.0-53049102457 | - |
dc.identifier.wosid | 000260755300001 | - |
dc.identifier.bibliographicCitation | INFORMATION PROCESSING LETTERS, v.108, no.6, pp.339 - 342 | - |
dc.relation.isPartOf | INFORMATION PROCESSING LETTERS | - |
dc.citation.title | INFORMATION PROCESSING LETTERS | - |
dc.citation.volume | 108 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 339 | - |
dc.citation.endPage | 342 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | IMBALANCED WIRELESS NETWORKS | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.subject.keywordPlus | SECURE | - |
dc.subject.keywordAuthor | Dictionary attack | - |
dc.subject.keywordAuthor | Key exchange | - |
dc.subject.keywordAuthor | Password | - |
dc.subject.keywordAuthor | RSA | - |
dc.subject.keywordAuthor | Cryptography | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.