1,642 Hits in 7.7 sec

A New Simple Authenticated Key Agreement and Protected Password Change Protocol [chapter]

Eun-Jun Yoon, Kee-Young Yoo
2005 Lecture Notes in Computer Science  
In 2005, Chang et al. proposed a simple authenticated key agreement and protected password change protocol. However, Chang et al.'  ...  s schemes to two simple attacks and then presents an improved scheme to resolve such problems. In contrast to Chang et al.'  ...  Acknowledgements We would like to thank the anonymous reviewers for their helpful comments in improving our manuscript.  ... 
doi:10.1007/11596042_98 fatcat:mmd5lvabpng2dexighvpl7mzf4

An enhanced authenticated key agreement protocol for wireless mobile communication

Rongxing Lu, Zhenfu Cao, Haojin Zhu
2007 Computer Standards & Interfaces  
s protocol can't resist the off-line password guessing attack, and therefore present an enhanced authenticated key agreement protocol.  ...  Quite recently, Sui et al. have presented an efficient authenticated key agreement protocol based on elliptic curves cryptography and included their protocol in 3GPP2 specifications to improve the security  ...  Acknowledgments The authors would like to thank the anonymous referees for their suggestions which significantly improved this paper.  ... 
doi:10.1016/j.csi.2007.04.002 fatcat:ftoxtlyfuzdifpshfj5db522ua

Offline dictionary attack on a universally composable three-party password-based key exchange protocol

Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu
2011 Procedia Engineering  
Password-based key exchange protocols allow parties to share a secret key in an authentic manner based on an easily memorizable password.  ...  password with a trusted server, can authenticate each other and compute a secure session key.  ...  Besides the man-in-the-middle attack, which is a key threat to the DH key agreement protocol [12] , the main attacks on password-based key agreement protocols include two kinds as below: 1.  ... 
doi:10.1016/j.proeng.2011.08.315 fatcat:a2en5l4lmjavjasdn27wtht2ge

Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

Younsung Choi, Junghyun Nam, Donghoon Lee, Jiye Kim, Jaewook Jung, Dongho Won
2014 The Scientific World Journal  
To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics.  ...  An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner  ...  guessing attacks, resistance to insider attacks, simple and secure password choice and modification, biometric template protection, and session key agreement.  ... 
doi:10.1155/2014/281305 pmid:25276847 pmcid:PMC4170879 fatcat:tda3lwllm5e27j4neiicg6p45a

Efficient Password-Typed Key Agreement Scheme [article]

Sattar J Aboud
2010 arXiv   pre-print
Then, the authors will propose an enhanced verifier typed key agreement scheme relied on Lee, Kim and Yoo scheme and demonstrate that the propose scheme resists against password guessing attack and stolen  ...  In this paper, we will study Lee, Kim and Yoo, a verifier password typed key agreement scheme and demonstrate that the scheme is not secure.  ...  To avoid these attacks, we presented a modified verifier-typed key agreement scheme relied on Lee, Kim and Yoo protocol and demonstrate that the propose scheme resists against password guessing attack  ... 
arXiv:1002.1163v1 fatcat:zxzfp3kmc5anrn4lax2vncre2u

Improvement of a Security Enhanced One-time Mutual Authentication and Key Agreement Scheme

In 2004, W.C.Ku proposed hash-based strongpassword based authentication scheme without using smart card that is vulnerable to the password guessing attack, not achieving mutual authentication and key agreement  ...  So far, many one-time password based authentication schemes have been proposed; however, none is secure enough.  ...  INTRODUCTION Password-based authentication is one of the most common, simple and easy-to-use authentication methods.  ... 
doi:10.35940/ijitee.l3761.1081219 fatcat:522nm3olh5fanpxl74ibhlbmji

A Simple and Robust Biometrics-based One-Time Identity-Password Authenticated Key Agreement Scheme

Tianhua Liu
2015 Journal of Information Hiding and Multimedia Signal Processing  
Then the new robust biometrics-based one-time identity-password (OTIP) authenticated key agreement protocol is given.  ...  Authenticated key agreement protocols plays an important role in solving the issues over public internet, it sets up secure scheme to finish authentication of users and confidentiality of information transmission  ...  On the base of these motivations, the paper proposes a new simple biometrics-based one-time identity-password (OTIP) authenticated with key agreement protocol for mobile device between server and user  ... 
dblp:journals/jihmsp/Liu15 fatcat:4n6twmlxkbhsrlxdvc43zdmsui

An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks

Liping Zhang, Shanyu Tang, Shaohui Zhu
2016 Journal of Network and Computer Applications  
Security analysis demonstrates that the proposed protocol can resist various attacks and provides efficient password updating.  ...  So an energy-efficient authenticated key agreement protocol for Session Initial Protocol (SIP) should be provided to ensure the confidentiality and integrity of data communications over VoIP networks.  ...  (2014) Our protocol Replay attack resist Yes Yes Yes Yes Yes Yes Modification attack resist Yes Yes Yes Yes No Yes Offline password guessing attack resist No No Yes Yes Yes  ... 
doi:10.1016/j.jnca.2015.06.022 fatcat:dyfdiynadnc35fklcstkxlqoza

Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey

Anitha KumariK, Sudha Sadasivam G, Madhumitha R
2014 International Journal of Computer Applications  
This paper presents an extensive survey of various Password Authenticated Key Exchange (PAKE) protocols available in the literature to eliminate the drawbacks in the current authentication procedure of  ...  Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations.  ...  Simple Authenticated Key Agreement Protocol [16] -satisfies the property of perfect forward secrecy -susceptible to offline password guessing attacks New GPAKE [14] - resistant to undetectable  ... 
doi:10.5120/16767-6334 fatcat:mirbmvi665cwfcv3cxsmhzogdy

Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function

Eun-Jun YOON, Kee-Young YOO
2011 IEICE transactions on information and systems  
This letter points out that Guo-Zhang's protocol is still vulnerable to off-line password guessing attacks, stolen-verifier attacks and reflection attacks.  ...  In 2010, Guo and Zhang proposed a group key agreement protocol based on the chaotic hash function.  ...  Acknowledgements We would like to thank the anonymous reviewers for their helpful comments in improving our manuscript.  ... 
doi:10.1587/transinf.e94.d.2167 fatcat:ipgpgif6jrdrzfy6ycjsxghlr4

Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection

Dan Zhu, Hongfeng Zhu, Shuai Geng, Rui Wang
2018 Journal of Information Hiding and Multimedia Signal Processing  
This paper presents a password-authenticated hybrid key agreement protocol (PAHKAP) with privacy-privacy to guard security for internet era, which can combine classical cryptography (Chaos Cryptography  ...  Compared with the former research AQKDPs (authenticated quantum key distribution protocols), PAHKAP have five merits: (1) the basis is dynamic against the long shared key revealed, (2) key agreement replaces  ...  Further Security Discussion. (1) The scheme could resist password guessing attack. Proof This attack means an adversary tries to guess a legal users password P W based on the transmitted information.  ... 
dblp:journals/jihmsp/ZhuZGW18 fatcat:uqeyizxvojerdifdp2pgey3z64

Improved G-3PAKE Protocol with Formal Verification

Manju Sanghi
2012 International Journal of Information and Network Security (IJINS)  
However these protocols should resist all types of password guessing attacks due to the low entropy of passwords.  ...  Keywords: Password based key exchange protocols, Undetectable on line password guessing attacks, Off-line password guessing attacks, AVISPA.  ...  In 1992, Bellovin and Merrit [1] proposed the first two party password based authenticated key agreement protocol.  ... 
doi:10.11591/ijins.v1i1.249 fatcat:b5cdlpmn3fdn7k3cv7g4i65zqa

Robust and Simple Authentication Protocol for Secure Communication on the Web [chapter]

Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo
2005 Lecture Notes in Computer Science  
Furthermore, they proposed an improved protocol that conquered the weaknesses and extended its key agreement functions, and improved the server's performance.  ...  Nevertheless, CWY's improved ROSI protocol does not provide perfect forward secrecy and is vulnerable to a Denning-Sacco attack.  ...  The proposed ROSI protocol can resist the server's secret key guessing attack. Proof.  ... 
doi:10.1007/11531371_47 fatcat:3u3jk2ivozbbjdi2hjr4bbhvxe

Mutual SIP Authentication Scheme Based on ECC

Samaneh Sadat Mousavi Nik, Mehdi Shahrabi
2014 International Journal of Computer and Electrical Engineering  
But the authentication mechanism proposed in SIP is based on HTTP Digest authentication that this scheme vulnerable against some attacks, such as off-line password guessing attacks, replay attacks, impersonate  ...  In the year 2012, Tang et al. proposed a SIP authentication using elliptic curve cryptography (ECC), but their scheme is insecure against off-line password guessing and DoS attacks.  ...  But this scheme vulnerable to off-line password guessing, Denning-Sacco and stolen-verifier attacks; furthermore, it did not provide any key agreement, known-key secrecy and perfect forward secrecy (PFS  ... 
doi:10.7763/ijcee.2014.v6.821 fatcat:shtxvzbgzzhyphocx5br3racla

A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem

Hongfeng Zhu, Xin Hao, Yifeng Zhang, Man Jiang
2015 Journal of Information Hiding and Multimedia Signal Processing  
In addition, the proposed scheme can resist common attacks such as guessing attack, replay attack, man-in-the-middle attack and so on.  ...  In the real world, in order to ensure secure communication, many chaotic maps-based key agreement protocols have been proposed.  ...  secrecy; S3: Mutual authenticatio; S4: Key agreement;S5: Secure password update l; S6: Secure biometrics update; S7: Resist Password guessing attack; S8: Resist replay attack; S9: Resist impersonation  ... 
dblp:journals/jihmsp/ZhuHZJ15 fatcat:u7zj5spyxvcejizgbk4jkvbkze
« Previous Showing results 1 — 15 out of 1,642 results