On the security of an enhanced authentication key exchange protocol

Min Shiang Hwang, Ting Yi Chang, Shu Chen Lin, Chwei Shyong Tsai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In 2003, Hwang et al. proposed an enhanced authentication key exchange protocol. Their protocol can generate multiple shared keys for two entities at a time and takes less computation time than Harn and Lin's protocol. However, we will show that Hwang et al.'s protocol cannot withstand the forgery signature attack. At the same time, we will repair the security flaw in their scheme.

Original languageEnglish
Title of host publicationProceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers)
EditorsL. Barolli
Pages160-163
Number of pages4
Publication statusPublished - 2004 Jul 7
EventProceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 - Fukuoka, Japan
Duration: 2004 Mar 292004 Mar 31

Publication series

NameProceedings - International Conference on Advanced Information Networking and Application (AINA)
Volume2

Other

OtherProceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004
CountryJapan
CityFukuoka
Period04-03-2904-03-31

Fingerprint

Authentication
Repair
Defects

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Hwang, M. S., Chang, T. Y., Lin, S. C., & Tsai, C. S. (2004). On the security of an enhanced authentication key exchange protocol. In L. Barolli (Ed.), Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers) (pp. 160-163). (Proceedings - International Conference on Advanced Information Networking and Application (AINA); Vol. 2).
Hwang, Min Shiang ; Chang, Ting Yi ; Lin, Shu Chen ; Tsai, Chwei Shyong. / On the security of an enhanced authentication key exchange protocol. Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). editor / L. Barolli. 2004. pp. 160-163 (Proceedings - International Conference on Advanced Information Networking and Application (AINA)).
@inproceedings{08a8b3cbffb14e6083df088ba6c7b38a,
title = "On the security of an enhanced authentication key exchange protocol",
abstract = "In 2003, Hwang et al. proposed an enhanced authentication key exchange protocol. Their protocol can generate multiple shared keys for two entities at a time and takes less computation time than Harn and Lin's protocol. However, we will show that Hwang et al.'s protocol cannot withstand the forgery signature attack. At the same time, we will repair the security flaw in their scheme.",
author = "Hwang, {Min Shiang} and Chang, {Ting Yi} and Lin, {Shu Chen} and Tsai, {Chwei Shyong}",
year = "2004",
month = "7",
day = "7",
language = "English",
isbn = "0769520510",
series = "Proceedings - International Conference on Advanced Information Networking and Application (AINA)",
pages = "160--163",
editor = "L. Barolli",
booktitle = "Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers)",

}

Hwang, MS, Chang, TY, Lin, SC & Tsai, CS 2004, On the security of an enhanced authentication key exchange protocol. in L Barolli (ed.), Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Proceedings - International Conference on Advanced Information Networking and Application (AINA), vol. 2, pp. 160-163, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004, Fukuoka, Japan, 04-03-29.

On the security of an enhanced authentication key exchange protocol. / Hwang, Min Shiang; Chang, Ting Yi; Lin, Shu Chen; Tsai, Chwei Shyong.

Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). ed. / L. Barolli. 2004. p. 160-163 (Proceedings - International Conference on Advanced Information Networking and Application (AINA); Vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - On the security of an enhanced authentication key exchange protocol

AU - Hwang, Min Shiang

AU - Chang, Ting Yi

AU - Lin, Shu Chen

AU - Tsai, Chwei Shyong

PY - 2004/7/7

Y1 - 2004/7/7

N2 - In 2003, Hwang et al. proposed an enhanced authentication key exchange protocol. Their protocol can generate multiple shared keys for two entities at a time and takes less computation time than Harn and Lin's protocol. However, we will show that Hwang et al.'s protocol cannot withstand the forgery signature attack. At the same time, we will repair the security flaw in their scheme.

AB - In 2003, Hwang et al. proposed an enhanced authentication key exchange protocol. Their protocol can generate multiple shared keys for two entities at a time and takes less computation time than Harn and Lin's protocol. However, we will show that Hwang et al.'s protocol cannot withstand the forgery signature attack. At the same time, we will repair the security flaw in their scheme.

UR - http://www.scopus.com/inward/record.url?scp=3042637414&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=3042637414&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:3042637414

SN - 0769520510

T3 - Proceedings - International Conference on Advanced Information Networking and Application (AINA)

SP - 160

EP - 163

BT - Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers)

A2 - Barolli, L.

ER -

Hwang MS, Chang TY, Lin SC, Tsai CS. On the security of an enhanced authentication key exchange protocol. In Barolli L, editor, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). 2004. p. 160-163. (Proceedings - International Conference on Advanced Information Networking and Application (AINA)).