Abstract
Recently, Chang et al. proposed a security enhancement in Ku and Wang's authenticated key agreement protocol. Two parties employ the pre-shared password to agreement a common session key via insecure network. However, in this article, we will show that Chang et al.'s scheme is suffer from the backward replay attack and the off-line password guessing attack.
Original language | English |
---|---|
Pages (from-to) | 55-57 |
Number of pages | 3 |
Journal | International Journal of Network Security |
Volume | 11 |
Issue number | 1 |
Publication status | Published - 2010 Dec 1 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications