Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Security Enhancement for the "Simple Authentication Key Agreement Algorithm"
COMPSAC '00 24th International Computer Software and Applications Conference
Improvement of modified authenticated key agreement protocol
Applied Mathematics and Computation
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
EPA: an efficient password-based protocol for authenticated key exchange
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Hi-index | 0.00 |
Recently, Kim et al. proposed an improvement to the Simple Authenticated Key Agreement (SAKA) protocol that has the same stability as the existing methods, and that has a much efficient processing performance. However, this improved scheme is still susceptible to off-line password guessing attacks and the integrity violence of a session key from illegal modification. The current paper demonstrates the vulnerability of Kim et al.’s scheme to off-line password guessing attacks and the integrity violence of the session key from illegal modification, and then presents an improved protocol based on the elliptic curve discrete logarithm problem (ECDLP) to resolve such problems. As a result, the proposed protocol resists off-line password guessing attacks and modification attack, while also providing more security and efficiency.