Abstract
The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), but its two-pass form is vulnerable to an unknown key-share attack. Recently, Lee et al. proposed an efficient two-pass key agreement protocol to withstand the unknown key-share attack. However, this article shows that their protocol is vulnerable to a key-compromise impersonation attack.
Original language | English |
---|---|
Pages (from-to) | 371-374 |
Number of pages | 4 |
Journal | Computer Standards and Interfaces |
Volume | 26 |
Issue number | 4 |
DOIs | |
Publication status | Published - 2004 Aug 1 |
All Science Journal Classification (ASJC) codes
- Software
- Hardware and Architecture
- Law