Improvement of HWWM-authenticated key agreement protocol

被引:4
作者
Lee, SW
Kim, HS
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
[2] Kyungil Univ, Dept Comp Engn, Kyungsan 712701, Kyungpook, South Korea
关键词
cryptography; authentication; password; key agreement; key exchange;
D O I
10.1016/j.amc.2004.03.010
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, Hsu et al. showed that Ku and Wang's authenticated key agreement protocol is vulnerable to the modification attack and then proposed an improved protocol, called HWWM protocol. In this paper, we argue that the HWWM protocol is still vulnerable to the modification attack and cannot also withstand the password guessing attack. Then, we propose an improved protocol to solve these problems. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1315 / 1320
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis of simple authenticated key agreement protocols
    Yang, CC
    Chang, TY
    Hwang, MS
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (08): : 2174 - 2176
  • [32] Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE ACCESS, 2018, 6 : 17130 - 17142
  • [33] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716
  • [34] Provably secured lightweight authenticated key agreement protocol for modern health industry
    Abdussami, Mohammad
    Amin, Ruhul
    Vollala, Satyanarayana
    AD HOC NETWORKS, 2023, 141
  • [35] A provably secure authenticated key agreement protocol for industrial sensor network system
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23)
  • [36] Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
    Nimbhorkar, S. U.
    Malik, L. G.
    2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 134 - 135
  • [37] ECC-Based Authenticated Key Agreement Protocol for Industrial Control System
    Chen, Yanru
    Yin, Fengming
    Hu, Shunfang
    Sun, Limin
    Li, Yang
    Xing, Bin
    Chen, Liangyin
    Guo, Bing
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 4688 - 4697
  • [38] A chaotic maps-based authenticated key agreement protocol with strong anonymity
    Zuowen Tan
    Nonlinear Dynamics, 2013, 72 : 311 - 320
  • [39] A chaotic maps-based authenticated key agreement protocol with strong anonymity
    Tan, Zuowen
    NONLINEAR DYNAMICS, 2013, 72 (1-2) : 311 - 320
  • [40] An authenticated key agreement protocol based on extended chaotic maps
    Jian, Shu
    ACTA PHYSICA SINICA, 2014, 63 (05) : 050507