Analysis of Two Authenticated Key Exchange Protocols
The design of secure authenticated key exchange (AKE) protocols has always been a notorious hard problem. Many famous AKE protocols have been found flaws since they were finished. In this paper, we analyze two AKE protocols, which were proposed by Hassan et al. in 2007 and 2008. Then we present key compromise impersonation attack and ephemeral key compromise attack to their two AKE protocols.
authenticated key exchange key compromise impersonation attack ephemeral key compromise attack
Qingfeng Cheng Guangguo Han Chuangui Ma
Zhengzhou Information Science and Technology Institute Zhengzhou, 450002, P. R. China Institute of Mathematics, Hangzhou Dianzi University, Hangzhou, 310018, P. R. China
国际会议
武汉
英文
1070-1072
2009-11-18(万方平台首次上网日期,不代表论文的发表时间)