TY - GEN
T1 - Weaknesses analysis and countermeasure of a verifier-based key agreement protocol
AU - Kim, Hyun Seok
AU - Seo, Seok
AU - Choi, Jin Young
PY - 2008
Y1 - 2008
N2 - In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of- initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.
AB - In 2005, Lee et al. (S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of- initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.
KW - Impersonation attack
KW - Key exchange
KW - Three party key agreement
UR - http://www.scopus.com/inward/record.url?scp=56349154626&partnerID=8YFLogxK
U2 - 10.1109/HPCC.2008.31
DO - 10.1109/HPCC.2008.31
M3 - Conference contribution
AN - SCOPUS:56349154626
SN - 9780769533520
T3 - Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
SP - 1015
EP - 1018
BT - Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
T2 - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
Y2 - 25 September 2008 through 27 September 2008
ER -