Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1626
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPadmavathy, R.-
dc.contributor.authorBhagvati, Chakravarthy-
dc.date.accessioned2024-11-21T09:11:07Z-
dc.date.available2024-11-21T09:11:07Z-
dc.date.issued2010-
dc.identifier.citation10.1007/978-3-642-12214-9_111en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1626-
dc.descriptionNITWen_US
dc.description.abstractThree-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas, by which two clients, each shares a human-memorable password with a trusted server, can agree a secure session key. Recently, Lu and Cao proposed a simple three party passwordbased key exchange protocol (STPKE protocol). They claimed that their protocol is secure, efficient and practical. Unlike their claims, Kim & Choi proved that the STPKE protocol is vulnerable to Undetectable on-line password guessing attacks, and suggested an enhanced protocol (STPKE’ protocol). In this paper, an Unknown key share attack on STPKE’ protocol is demonstrated. The attack is implemented using a comprehensive set of experiments and reported. Additionally, the countermeasures to resist the above attack are discusseden_US
dc.language.isoenen_US
dc.subjectUnknown Key share attacken_US
dc.subjectSTPKE protocolen_US
dc.titleUnknown Key Share Attack on STPKE’ Protocolen_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
978-3-642-12214-9_111.pdf94.4 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.