Filters








1,382 Hits in 5.1 sec

Cryptanalysis Of Yang-Li-Liao'S Simple Three-Party Key Exchange (S-3Pake) Protocol

Hae-Soon Ahn, Eun-Jun Yoon
2013 Zenodo  
Three-party password authenticated key exchange (3PAKE) protocols are widely deployed on lots of remote user authentication system due to its simplicity and convenience of maintaining a human-memorable  ...  Recently, an improvement of 3PAKE protocol by processing a built-in data attached to other party for identity authentication to individual data was proposed by some researchers.  ...  s simple three-party key exchange protocol(S-3PAKE) protocol. I. Fig. 1 depicts the Yang et al.'  ... 
doi:10.5281/zenodo.1088509 fatcat:hle5fssm2bdxhn7pp57pjivnxq

Cryptanalysis of a Simple Three-party Key Exchange Protocol

He Debiao, Chen Jianhua, Hu Jin
2010 Informatica   unpublished
Among these is the so-called S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting.  ...  Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key.  ...  [2] presented two enhanced three-party encrypted key exchange (3PEKE) protocols without using public key techniques, and showed that their protocols can resist several attacks, achieve mutual authentica-tion  ... 
fatcat:nahxmsinovgjdj62skmnjx4zg4

Cryptanalysis of Guo et al.'s three-party password-based authenticated key exchange (G-3PAKE) protocol

Sung-Bae Choi, Eun-Jun Yoon
2011 Procedia Engineering  
In 2008, Guo et al. have shown that Lu and Cao's simple three-party protocol for passwordauthenticated key exchanges (S-3PAKE) is indeed completely insecure against a kind of manin-the-middle attack and  ...  In addition, they have provided an improved protocol (G-3PAKE) that addresses the identified security problems.  ...  In 2007, Lu and Cao ( [1] ) proposed a simple three-party password-based authenticated key exchange (S-3PAKE) protocol, where two clients, each shares a human-memorable password with a trusted server,  ... 
doi:10.1016/j.proeng.2011.11.2624 fatcat:ybgiomzljrbwlmuu442feog7zm

RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash

Umar Mujahid, M. Najam-ul-Islam, M. Ali Shami
2015 International Journal of Distributed Sensor Networks  
RFID is one of the most protuberant systems in the field of ubiquitous computing.  ...  Since RFID tags have limited computation capabilities, numerous ultralightweight authentication protocols have been proposed to provide privacy and security.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2015/642180 fatcat:6f4eap2zlzhrhlwgilqihxziyq

Cryptanalysis of some protocols using matrices over group rings [article]

Mohammad Eftekhari
2015 arXiv   pre-print
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring.  ...  We can find the secret key and break entirely the protocols.  ...  The conclusion of all three papers above is that using a quantum computer one can break the key exchange protocol of [4] .  ... 
arXiv:1503.04779v1 fatcat:rfycaeuyszfl5c3j7rc4x7l2iu

Cryptanalysis of Some Protocols Using Matrices over Group Rings [chapter]

Mohammad Eftekhari
2017 Lecture Notes in Computer Science  
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring.  ...  We can find the secret key and break entirely the protocols.  ...  The conclusion of all three papers above is that using a quantum computer one can break the key exchange protocol of [4] .  ... 
doi:10.1007/978-3-319-57339-7_13 fatcat:2sao4koc6bfqbnxkvvg2aw3siq

Cryptanalysis of an e_cient three-party password-based key exchange scheme

Eun-Jun Yoon, Kee-Young Yoo
2012 Procedia Engineering  
In 2010, Lou-Huang proposed a new simple three-party password-based authenticated key exchange (LH-3PAKE) scheme based on elliptic curve cryptography (ECC).  ...  In order to secure communications between two clients with a trusted server's help in public network environments, a three-party password-based authenticated key exchange (3PAKE) scheme is used to provide  ...  Recently, Lou-Huang proposed a new simple three-party password-based authenticated key exchange (LH-3PAKE) scheme based on ECC.  ... 
doi:10.1016/j.proeng.2012.01.604 fatcat:irviy4ysvfd3plna5zyyd43suq

Photuris: Design Criteria [chapter]

William Allen Simpson
2000 Lecture Notes in Computer Science  
Historic look at design principles and requirements for a practical key management communication protocol. Refinement of terms, threat environment and limitations, and necessary features.  ...  Dynamic computational time and network round-trip time are well integrated with protocol specification. First use of anti-clogging tokens to defend against resource attacks.  ...  Simplicity The hallmark of successful Internet protocols is that they are relatively simple.  ... 
doi:10.1007/3-540-46513-8_17 fatcat:rmct7h4upjbzbhtgpishvio4n4

Authentication protocols for the broadband ISDN billing system

Chi-Chun Lo, Yi-Chun Yeh
1999 Computer Standards & Interfaces  
Both protocols are designed in conjunction with a suggested key management method. Cryptanalysis shows that both the MAP and the PAP are very secure.  ...  MAP applies the cipher block chaining CBC encryption in the two-party authentication protocol, while the PAP is a Ž . modified version of the station-to-station STS authentication protocol.  ...  The secure two-party authentication protocol proposed by Bird The X.509 three-way exchange, described in ITU-T Recommendations X.509, is a novel example of public-key-based authentication protocols.  ... 
doi:10.1016/s0920-5489(99)00024-0 fatcat:glyrrzoyqnaqnjaiqji6wtebbi

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'

Shirisha Tallapally, R. Padmavathy
2010 Journal of Information Processing Systems  
In the secure communication areas, three-party authenticated key exchange protocol is an important cryptographic technique.  ...  On the other hand the protocol should resist all types of password guessing attacks. Recently, STPKE' protocol has been proposed by Kim and Choi.  ...  INTRODUCTION In the secure communication areas, three party key exchange protocol is one of the most important cryptographic mechanisms.  ... 
doi:10.3745/jips.2010.6.1.043 fatcat:eibpzprsxza65h6yjhwlv5ce64

Cryptanalysis of Syverson's Rational Exchange Protocol

Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
2008 International Journal of Network Security  
The notion of rational exchange introduced by Syverson in 1998 is a particularly interesting alternative when an efficient scheme for fair exchange is required but the existence of a trusted third party  ...  A rational exchange protocol cannot provide true fairness, but it ensures that rational -i.e. self-interested-parties would have no reason to deviate from the protocol.  ...  Fixing the Protocol Even though the replay attacks one to three described in the previous section correspond to simple deviations from the protocol description, they represent real threats to parties using  ... 
dblp:journals/ijnsec/AlcaideECR08 fatcat:3ka6d3ioj5dthofmh7deexpjgy

Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol [chapter]

Julio C. Hernandez-Castro, Juan M. E. Tapiador, Arturo Ribagorda
2008 Communications in Computer and Information Science  
In this work, we present a simple model for the automated cryptanalysis of cryptographic protocols based on meta-heuristic search.  ...  We illustrate our approach with a straightforward application in the form of an attack against a slightly simplified version of an ultra-lightweight authentication protocol for RFID environments called  ...  Most cryptographic protocols should exchange one or more messages to accomplish their intended objective (authentication, key exchange, key agreement, etc.), and in the vast majority of cases these messages  ... 
doi:10.1007/978-3-540-87477-5_62 fatcat:pz7gk5ghbff2dew3pec4urnxs4

Cryptanalysis of S-3PAKE++ protocol

Eun-Jun Yoon
2014 Applied Mathematical Sciences  
In 2013, Nam et al. proposed a simple three-party password-based authenticated key exchange (in short, S-3PAKE ++ ) protocol that can withstand dictionary attacks.  ...  However, this paper points out that the S-3PAKE ++ protocol is still vulnerable to undetectable on-line dictionary attack. For this reason, Nam et al.'s protocol is insecure for practical application.  ...  Introduction Recently, three-party password-based authenticated key exchange (3PAKE) protocols are extensively adopted in network communication environments to provide secure communications.  ... 
doi:10.12988/ams.2014.49778 fatcat:nufkul2s45ghlcoewimmdll3c4

Page 6573 of Mathematical Reviews Vol. , Issue 99i [page]

1999 Mathematical Reviews  
, From unpredictability to indistinguishability: a simple construction of pseudo-random functions from MACs (extended  ...  The cryptosystems mainly discussed are the Diffie-Hellman key exchange scheme (DH), the Bellare-Micali noninteractive oblivi- ous transfer scheme (BM), the ElGamal public-key cryptosystem (EG), the Okamoto  ... 

Dynamic Key Cryptography and Applications

Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan
2010 International Journal of Network Security  
However, cryptography itself is subject to cryptanalysis attacks. To reduce the cryptanalysis attack risk, a dynamic key theory is presented and analyzed in this paper.  ...  Because these dynamic keys are one-time used symmetric cryptographic keys, they can significantly improve the security of cryptographic systems.  ...  Payment Protocol Payment protocol is the protocol communicating between three parties: Client(C), Merchant(M ) and Bank(B).  ... 
dblp:journals/ijnsec/NgoWLWS10 fatcat:jhgpcjng3ffedkpytd7mzagt7i
« Previous Showing results 1 — 15 out of 1,382 results