Cryptanalysis of the improved authenticated key agreement protocol

Ting-Yi  Chang, Chou Chan Yang, Ya Wen Yang

Research output: Contribution to journalArticle

Abstract

Hsu et al. recently pointed out that the Ku-Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack.

Original languageEnglish
Pages (from-to)771-774
Number of pages4
JournalApplied Mathematics and Computation
Volume171
Issue number2
DOIs
Publication statusPublished - 2005 Dec 15

Fingerprint

Key Agreement Protocol
Cryptanalysis
Attack
Password
Line

All Science Journal Classification (ASJC) codes

  • Computational Mathematics
  • Applied Mathematics

Cite this

Chang, Ting-Yi  ; Yang, Chou Chan ; Yang, Ya Wen. / Cryptanalysis of the improved authenticated key agreement protocol. In: Applied Mathematics and Computation. 2005 ; Vol. 171, No. 2. pp. 771-774.
@article{5e9ee9236cbf4ca2a9e61d5382fc3fd1,
title = "Cryptanalysis of the improved authenticated key agreement protocol",
abstract = "Hsu et al. recently pointed out that the Ku-Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack.",
author = "Ting-Yi  Chang and Yang, {Chou Chan} and Yang, {Ya Wen}",
year = "2005",
month = "12",
day = "15",
doi = "10.1093/carcin/bgi018",
language = "English",
volume = "171",
pages = "771--774",
journal = "Applied Mathematics and Computation",
issn = "0096-3003",
publisher = "Elsevier Inc.",
number = "2",

}

Cryptanalysis of the improved authenticated key agreement protocol. / Chang, Ting-Yi ; Yang, Chou Chan; Yang, Ya Wen.

In: Applied Mathematics and Computation, Vol. 171, No. 2, 15.12.2005, p. 771-774.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Cryptanalysis of the improved authenticated key agreement protocol

AU - Chang, Ting-Yi 

AU - Yang, Chou Chan

AU - Yang, Ya Wen

PY - 2005/12/15

Y1 - 2005/12/15

N2 - Hsu et al. recently pointed out that the Ku-Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack.

AB - Hsu et al. recently pointed out that the Ku-Wang scheme is vulnerable to modification attack and further proposed an improvement on their scheme. However, this article will show the improvement which they claim is still vulnerable by off-line password guessing attack.

UR - http://www.scopus.com/inward/record.url?scp=31144475020&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=31144475020&partnerID=8YFLogxK

U2 - 10.1093/carcin/bgi018

DO - 10.1093/carcin/bgi018

M3 - Article

VL - 171

SP - 771

EP - 774

JO - Applied Mathematics and Computation

JF - Applied Mathematics and Computation

SN - 0096-3003

IS - 2

ER -