A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A New Simple Authenticated Key Agreement and Protected Password Change Protocol
[chapter]
2005
Lecture Notes in Computer Science
In 2005, Chang et al. proposed a simple authenticated key agreement and protected password change protocol. However, Chang et al.' ...
s schemes to two simple attacks and then presents an improved scheme to resolve such problems. In contrast to Chang et al.' ...
Acknowledgements We would like to thank the anonymous reviewers for their helpful comments in improving our manuscript. ...
doi:10.1007/11596042_98
fatcat:mmd5lvabpng2dexighvpl7mzf4
An enhanced authenticated key agreement protocol for wireless mobile communication
2007
Computer Standards & Interfaces
s protocol can't resist the off-line password guessing attack, and therefore present an enhanced authenticated key agreement protocol. ...
Quite recently, Sui et al. have presented an efficient authenticated key agreement protocol based on elliptic curves cryptography and included their protocol in 3GPP2 specifications to improve the security ...
Acknowledgments The authors would like to thank the anonymous referees for their suggestions which significantly improved this paper. ...
doi:10.1016/j.csi.2007.04.002
fatcat:ftoxtlyfuzdifpshfj5db522ua
Offline dictionary attack on a universally composable three-party password-based key exchange protocol
2011
Procedia Engineering
Password-based key exchange protocols allow parties to share a secret key in an authentic manner based on an easily memorizable password. ...
password with a trusted server, can authenticate each other and compute a secure session key. ...
Besides the man-in-the-middle attack, which is a key threat to the DH key agreement protocol [12] , the main attacks on password-based key agreement protocols include two kinds as below: 1. ...
doi:10.1016/j.proeng.2011.08.315
fatcat:a2en5l4lmjavjasdn27wtht2ge
Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
2014
The Scientific World Journal
To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. ...
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner ...
guessing attacks, resistance to insider attacks, simple and secure password choice and modification, biometric template protection, and session key agreement. ...
doi:10.1155/2014/281305
pmid:25276847
pmcid:PMC4170879
fatcat:tda3lwllm5e27j4neiicg6p45a
Efficient Password-Typed Key Agreement Scheme
[article]
2010
arXiv
pre-print
Then, the authors will propose an enhanced verifier typed key agreement scheme relied on Lee, Kim and Yoo scheme and demonstrate that the propose scheme resists against password guessing attack and stolen ...
In this paper, we will study Lee, Kim and Yoo, a verifier password typed key agreement scheme and demonstrate that the scheme is not secure. ...
To avoid these attacks, we presented a modified verifier-typed key agreement scheme relied on Lee, Kim and Yoo protocol and demonstrate that the propose scheme resists against password guessing attack ...
arXiv:1002.1163v1
fatcat:zxzfp3kmc5anrn4lax2vncre2u
Improvement of a Security Enhanced One-time Mutual Authentication and Key Agreement Scheme
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In 2004, W.C.Ku proposed hash-based strongpassword based authentication scheme without using smart card that is vulnerable to the password guessing attack, not achieving mutual authentication and key agreement ...
So far, many one-time password based authentication schemes have been proposed; however, none is secure enough. ...
INTRODUCTION Password-based authentication is one of the most common, simple and easy-to-use authentication methods. ...
doi:10.35940/ijitee.l3761.1081219
fatcat:522nm3olh5fanpxl74ibhlbmji
A Simple and Robust Biometrics-based One-Time Identity-Password Authenticated Key Agreement Scheme
2015
Journal of Information Hiding and Multimedia Signal Processing
Then the new robust biometrics-based one-time identity-password (OTIP) authenticated key agreement protocol is given. ...
Authenticated key agreement protocols plays an important role in solving the issues over public internet, it sets up secure scheme to finish authentication of users and confidentiality of information transmission ...
On the base of these motivations, the paper proposes a new simple biometrics-based one-time identity-password (OTIP) authenticated with key agreement protocol for mobile device between server and user ...
dblp:journals/jihmsp/Liu15
fatcat:4n6twmlxkbhsrlxdvc43zdmsui
An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks
2016
Journal of Network and Computer Applications
Security analysis demonstrates that the proposed protocol can resist various attacks and provides efficient password updating. ...
So an energy-efficient authenticated key agreement protocol for Session Initial Protocol (SIP) should be provided to ensure the confidentiality and integrity of data communications over VoIP networks. ...
(2014)
Our
protocol
Replay attack resist
Yes
Yes
Yes
Yes
Yes
Yes
Modification attack resist
Yes
Yes
Yes
Yes
No
Yes
Offline password guessing attack resist No
No
Yes
Yes
Yes ...
doi:10.1016/j.jnca.2015.06.022
fatcat:dyfdiynadnc35fklcstkxlqoza
Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey
2014
International Journal of Computer Applications
This paper presents an extensive survey of various Password Authenticated Key Exchange (PAKE) protocols available in the literature to eliminate the drawbacks in the current authentication procedure of ...
Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. ...
Simple
Authenticated
Key
Agreement
Protocol [16]
-satisfies the
property of perfect
forward secrecy
-susceptible to
offline
password
guessing attacks
New GPAKE
[14]
-
resistant
to
undetectable ...
doi:10.5120/16767-6334
fatcat:mirbmvi665cwfcv3cxsmhzogdy
Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
2011
IEICE transactions on information and systems
This letter points out that Guo-Zhang's protocol is still vulnerable to off-line password guessing attacks, stolen-verifier attacks and reflection attacks. ...
In 2010, Guo and Zhang proposed a group key agreement protocol based on the chaotic hash function. ...
Acknowledgements We would like to thank the anonymous reviewers for their helpful comments in improving our manuscript. ...
doi:10.1587/transinf.e94.d.2167
fatcat:ipgpgif6jrdrzfy6ycjsxghlr4
Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection
2018
Journal of Information Hiding and Multimedia Signal Processing
This paper presents a password-authenticated hybrid key agreement protocol (PAHKAP) with privacy-privacy to guard security for internet era, which can combine classical cryptography (Chaos Cryptography ...
Compared with the former research AQKDPs (authenticated quantum key distribution protocols), PAHKAP have five merits: (1) the basis is dynamic against the long shared key revealed, (2) key agreement replaces ...
Further Security Discussion. (1) The scheme could resist password guessing attack. Proof This attack means an adversary tries to guess a legal users password P W based on the transmitted information. ...
dblp:journals/jihmsp/ZhuZGW18
fatcat:uqeyizxvojerdifdp2pgey3z64
Improved G-3PAKE Protocol with Formal Verification
2012
International Journal of Information and Network Security (IJINS)
However these protocols should resist all types of password guessing attacks due to the low entropy of passwords. ...
Keywords: Password based key exchange protocols, Undetectable on line password guessing attacks, Off-line password guessing attacks, AVISPA. ...
In 1992, Bellovin and Merrit [1] proposed the first two party password based authenticated key agreement protocol. ...
doi:10.11591/ijins.v1i1.249
fatcat:b5cdlpmn3fdn7k3cv7g4i65zqa
Robust and Simple Authentication Protocol for Secure Communication on the Web
[chapter]
2005
Lecture Notes in Computer Science
Furthermore, they proposed an improved protocol that conquered the weaknesses and extended its key agreement functions, and improved the server's performance. ...
Nevertheless, CWY's improved ROSI protocol does not provide perfect forward secrecy and is vulnerable to a Denning-Sacco attack. ...
The proposed ROSI protocol can resist the server's secret key guessing attack. Proof. ...
doi:10.1007/11531371_47
fatcat:3u3jk2ivozbbjdi2hjr4bbhvxe
Mutual SIP Authentication Scheme Based on ECC
2014
International Journal of Computer and Electrical Engineering
But the authentication mechanism proposed in SIP is based on HTTP Digest authentication that this scheme vulnerable against some attacks, such as off-line password guessing attacks, replay attacks, impersonate ...
In the year 2012, Tang et al. proposed a SIP authentication using elliptic curve cryptography (ECC), but their scheme is insecure against off-line password guessing and DoS attacks. ...
But this scheme vulnerable to off-line password guessing, Denning-Sacco and stolen-verifier attacks; furthermore, it did not provide any key agreement, known-key secrecy and perfect forward secrecy (PFS ...
doi:10.7763/ijcee.2014.v6.821
fatcat:shtxvzbgzzhyphocx5br3racla
A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem
2015
Journal of Information Hiding and Multimedia Signal Processing
In addition, the proposed scheme can resist common attacks such as guessing attack, replay attack, man-in-the-middle attack and so on. ...
In the real world, in order to ensure secure communication, many chaotic maps-based key agreement protocols have been proposed. ...
secrecy; S3: Mutual authenticatio; S4: Key agreement;S5: Secure password update l; S6: Secure biometrics update; S7: Resist Password guessing attack; S8: Resist replay attack; S9: Resist impersonation ...
dblp:journals/jihmsp/ZhuHZJ15
fatcat:u7zj5spyxvcejizgbk4jkvbkze
« Previous
Showing results 1 — 15 out of 1,642 results