Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
A man-in-the-middle attack on UMTS
Proceedings of the 3rd ACM workshop on Wireless security
Hi-index | 0.00 |
User authentication is an operation whereby one user is aware of the identity of an another user involved in a protocol. In 2004, Park presented an authentication protocol providing user anonymity based on the secret-key certificate and error-correcting codes called PA protocol. In this paper, it will be argued that PA protocol is vulnerable to the man-in-the-middle attack and does not provide a sufficient level of security. Then, an improved protocol to fix this problem is proposed.