Abstract
Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly.
Original language | English |
---|---|
Pages (from-to) | 2274-2279 |
Number of pages | 6 |
Journal | IEEE Transactions on Wireless Communications |
Volume | 8 |
Issue number | 5 |
DOIs | |
Publication status | Published - 2009 May |
Bibliographical note
Funding Information:This work was supported by the Korea Research Foundation Grant funded by the Korean Government(MOEHRD, Basic Research Promotion Fund)(KRF-2008-314-D00412). Digital Object Identifier 10.1109/TWC.2009.080693
Keywords
- Authentication
- E-residue attack
- Key exchange
- Leakage-resilience
- Off-line dictionary attack
- Password
ASJC Scopus subject areas
- Computer Science Applications
- Electrical and Electronic Engineering
- Applied Mathematics