English  |  正體中文  |  简体中文  |  Items with full text/Total items : 57064/90742 (63%)
Visitors : 12483202      Online Users : 167
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/75782

    Title: Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices
    Authors: Shieh, Wen-Gong;Horng, Wen-Bing
    Contributors: 淡江大學資訊工程學系
    Keywords: Authenticated key exchange protocol;Cryptanalysis;Low power computing
    Date: 2011-11
    Issue Date: 2012-04-14 06:23:39 (UTC+8)
    Publisher: Japan: ICIC International
    Abstract: Designing authenticated key exchange protocols for portable devices to secure communications is an emerging issue. Recently, Wen et al. proposed two provably secure authenticated key exchange protocols for low power computing devices. However, we show that the first protocol is vulnerable to the replay attack, while the second one is subject to the generic man-in-the-middle attack. Besides, both protocols are susceptible to the modification attack as well as the user impersonation attack. Based on the underline
    reasons of such successful attacks, we extend their protocols to defend such attacks.
    Relation: ICIC Express Letters: An International Journal of Research and Surveys 5(11), pp.4027-4032
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Journal Article

    Files in This Item:

    File Description SizeFormat
    1881-803X_5(11)p4027-4032.pdf1063KbAdobe PDF0View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback