Abstract | ||
---|---|---|
In a three party authenticated key exchange protocol, two clients intend to establish a session key with the help of the trusted server, during which the authentication is realized by messages exchange about password which is shared between each client and the trusted server. In 2009, Huang proposed an efficient three party authenticated key exchange for mobile communications without the server's public key and stated that it can resist various attacks and receive high efficiency. However, this paper demonstrates that Huang's protocol is vulnerable to undetectable online password guessing attacks and off-line password guessing attacks. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/iNCoS.2012.39 | INCoS |
Keywords | Field | DocType |
online password,messages exchange,mobile communication,off-line password,key exchange,session key,high efficiency,various attack,public key,efficient three-party key exchange,key exchange protocol,public key cryptography,authentication,servers,elliptic curve cryptography,barium,protocols,cryptographic protocols,password | Zero-knowledge password proof,Password strength,Computer science,Computer security,Authenticated Key Exchange,Computer network,S/KEY,One-time password,Password,Key-agreement protocol,Encrypted key exchange | Conference |
Citations | PageRank | References |
0 | 0.34 | 12 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiao-Tong Fu | 1 | 10 | 3.46 |
Ruijun Shi | 2 | 0 | 1.01 |