CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
Proceedings of the 5th International Workshop on Security Protocols
Extended Password Key Exchange Protocols Immune to Dictionary Attacks
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Enhanced of key agreement protocols resistant to a denial-of-service attack
Fundamenta Informaticae
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
New efficient simple authenticated key agreement protocol
COCOON'05 Proceedings of the 11th annual international conference on Computing and Combinatorics
Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack
Fundamenta Informaticae
Hi-index | 0.00 |
The weaknesses of the simple authenticated key agreement (SAKA) protocol were shown by Sun. The weaknesses include (1) it cannot detect a masquerade, (2) it cannot withstand the dictionary attack, and (3) it cannot provide perfect forward secrecy. In this paper, we will improve the SAKA algorithm to overcome these weaknesses. Besides, we will show that the improved scheme is more simple and secure than the original one.