透過您的圖書館登入
IP:3.129.13.201
  • 期刊

Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol

並列摘要


In recent issue of Journal of Applied Mathematics and Computation (2005), Lee, Kim, & Yoo revealed an attack on Hsu, Wu, & Wu (2003) authenticated key agreement protocol, and then presented an improved protocol. However, Lee, Kim, & Yoo (2005) present only heuristic argument with no formal proof of security. In this work, we revealed previously unpublished flaw in the protocol. We may speculate that such errors could have been found by protocol designers if proofs of security were to be constructed, and hope this work will encourage future protocol designers to provide proofs of security. We conclude with a countermeasure due to Choo, Boyd, & Hitchcock (2005).

被引用紀錄


Chen, T. H. (2010). 智慧卡密碼驗證機制通訊協定之應用與研究 [doctoral dissertation, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2010.00619
Wu, C. Y. (2011). 植基於 ID-PKC 電子書數位所有權 [master's thesis, National Taichung University of Science and Technology]. Airiti Library. https://doi.org/10.6826/NUTC.2011.00008
Liao, Y. P. (2010). 多種環境的安全密碼認證金鑰交換協定之研究 [doctoral dissertation, Tatung University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0081-3001201315104936
Yeh, H. L. (2013). 在網路通訊安全應用中的身份認證與多媒體技術之研究 [doctoral dissertation, National Tsing Hua University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0016-2511201311370677

延伸閱讀