Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords

Junghyun Nam, Seungjoo Kim, Dongho Won

Research output: Contribution to journalArticlepeer-review

17 Citations (Scopus)

Abstract

We show that Sun-Chen-Hwang's three-party key agreement protocols using passwords are insecure against an active adversary. Further, we recommend a small change to the protocols that fixes the security problem.

Original languageEnglish
Pages (from-to)209-212
Number of pages4
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE89-A
Issue number1
DOIs
Publication statusPublished - 2006 Jan
Externally publishedYes

Keywords

  • Password
  • Three-party key agreement
  • Verifier

ASJC Scopus subject areas

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords'. Together they form a unique fingerprint.

Cite this