Weakness in simple authenticated key agreement protocol

Research output: Contribution to journalArticle

44 Citations (Scopus)

Abstract

Seo and Sweeney recently proposed a simple authenticated key agreement protocol using a password-based method. They claimed that the established session key between two users is also verified. However, the author points out that verification of the session key cannot be achieved in their protocol. A slight improvement to their protocol is proposed to overcome this weakness.

Original languageEnglish
Pages (from-to)48-49
Number of pages2
JournalElectronics Letters
Volume36
Issue number1
DOIs
Publication statusPublished - 2000 Jan 6

Fingerprint

Network protocols

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

@article{8b1617d91c18454e9f7c2952d82a0164,
title = "Weakness in simple authenticated key agreement protocol",
abstract = "Seo and Sweeney recently proposed a simple authenticated key agreement protocol using a password-based method. They claimed that the established session key between two users is also verified. However, the author points out that verification of the session key cannot be achieved in their protocol. A slight improvement to their protocol is proposed to overcome this weakness.",
author = "Yuh-Min Tseng",
year = "2000",
month = "1",
day = "6",
doi = "10.1049/el:20000112",
language = "English",
volume = "36",
pages = "48--49",
journal = "Electronics Letters",
issn = "0013-5194",
publisher = "Institution of Engineering and Technology",
number = "1",

}

Weakness in simple authenticated key agreement protocol. / Tseng, Yuh-Min.

In: Electronics Letters, Vol. 36, No. 1, 06.01.2000, p. 48-49.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Weakness in simple authenticated key agreement protocol

AU - Tseng, Yuh-Min

PY - 2000/1/6

Y1 - 2000/1/6

N2 - Seo and Sweeney recently proposed a simple authenticated key agreement protocol using a password-based method. They claimed that the established session key between two users is also verified. However, the author points out that verification of the session key cannot be achieved in their protocol. A slight improvement to their protocol is proposed to overcome this weakness.

AB - Seo and Sweeney recently proposed a simple authenticated key agreement protocol using a password-based method. They claimed that the established session key between two users is also verified. However, the author points out that verification of the session key cannot be achieved in their protocol. A slight improvement to their protocol is proposed to overcome this weakness.

UR - http://www.scopus.com/inward/record.url?scp=0033640351&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0033640351&partnerID=8YFLogxK

U2 - 10.1049/el:20000112

DO - 10.1049/el:20000112

M3 - Article

AN - SCOPUS:0033640351

VL - 36

SP - 48

EP - 49

JO - Electronics Letters

JF - Electronics Letters

SN - 0013-5194

IS - 1

ER -