Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1626Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Padmavathy, R. | - |
| dc.contributor.author | Bhagvati, Chakravarthy | - |
| dc.date.accessioned | 2024-11-21T09:11:07Z | - |
| dc.date.available | 2024-11-21T09:11:07Z | - |
| dc.date.issued | 2010 | - |
| dc.identifier.citation | 10.1007/978-3-642-12214-9_111 | en_US |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/1626 | - |
| dc.description | NITW | en_US |
| dc.description.abstract | Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas, by which two clients, each shares a human-memorable password with a trusted server, can agree a secure session key. Recently, Lu and Cao proposed a simple three party passwordbased key exchange protocol (STPKE protocol). They claimed that their protocol is secure, efficient and practical. Unlike their claims, Kim & Choi proved that the STPKE protocol is vulnerable to Undetectable on-line password guessing attacks, and suggested an enhanced protocol (STPKE’ protocol). In this paper, an Unknown key share attack on STPKE’ protocol is demonstrated. The attack is implemented using a comprehensive set of experiments and reported. Additionally, the countermeasures to resist the above attack are discussed | en_US |
| dc.language.iso | en | en_US |
| dc.subject | Unknown Key share attack | en_US |
| dc.subject | STPKE protocol | en_US |
| dc.title | Unknown Key Share Attack on STPKE’ Protocol | en_US |
| dc.type | Other | en_US |
| Appears in Collections: | Computer Science & Engineering | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 978-3-642-12214-9_111.pdf | 94.4 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.