Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Timestamps in key distribution protocols
Communications of the ACM
Password-Authenticated Key Exchange between Clients with Different Passwords
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A New Client-to-Client Password-Authenticated Key Agreement Protocol
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Performance of Non-coherent MFSK with Selection and Switched Diversity Over Hoyt Fading Channel
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In 2004, Kim et al. proposed an improvement to Byun et al.’s client to client password-authenticated key exchange(C2C-PAKE) protocol in a cross-realm setting. However, the current paper demonstrates that Kim et al.’s C2C-PAKE protocol is susceptible to a one-way man-in-the-middle attack and a password-compromise impersonation attack. Also, we presents an enhancement to resolve such problems.