4.2 Article

Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords

Publisher

IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
DOI: 10.1093/ietfec/e89-a.1.209

Keywords

three-party key agreement; password; verifier

Ask authors/readers for more resources

We show that Sun-Chen-Hwang's three-party key agreement protocols using passwords are insecure against an active adversary. Further, we recommend a small change to the protocols that fixes the security problem.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available