Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2811
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPadmavathy, R.-
dc.date.accessioned2025-01-18T11:16:28Z-
dc.date.available2025-01-18T11:16:28Z-
dc.date.issued2011-10-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/2811-
dc.descriptionNITWen_US
dc.description.abstractThe key exchange protocols using passwords achieved great attention due to their simplicity and e ciency. On the other hand these protocols should resist all types of password guessing attacks, as the password is of low entropy. Recently Lu and Cao proposed a three party simple key ex-change protocol (S-3PAKE). It is an extension of Abdella and Pointchval SPAKE protocol. Later Guo et al. proposed a man in the middle attack and undetectable online password guessing attack on the above protocol. They also presented an improved S3PAKE. In the present paper we have shown that the improved S-3PAKE still su ers from undetectable pass-word guessing attack and discuss the countermeasures to preclude such an attacken_US
dc.language.isoenen_US
dc.publisherInternational Journal of Security and Its Applicationsen_US
dc.subjectPAKEen_US
dc.subjectS-3PAKEen_US
dc.titleA Password Attack on S-3 PAKEen_US
dc.typeArticleen_US
Appears in Collections:Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
10.pdf181.94 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.