A note on leakage-resilient authenticated key exchange

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)

    Abstract

    Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly.

    Original languageEnglish
    Pages (from-to)2274-2279
    Number of pages6
    JournalIEEE Transactions on Wireless Communications
    Volume8
    Issue number5
    DOIs
    Publication statusPublished - 2009 May

    Bibliographical note

    Funding Information:
    This work was supported by the Korea Research Foundation Grant funded by the Korean Government(MOEHRD, Basic Research Promotion Fund)(KRF-2008-314-D00412). Digital Object Identifier 10.1109/TWC.2009.080693

    Keywords

    • Authentication
    • E-residue attack
    • Key exchange
    • Leakage-resilience
    • Off-line dictionary attack
    • Password

    ASJC Scopus subject areas

    • Computer Science Applications
    • Electrical and Electronic Engineering
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'A note on leakage-resilient authenticated key exchange'. Together they form a unique fingerprint.

    Cite this