会议专题

Analysis of Two Authenticated Key Exchange Protocols

The design of secure authenticated key exchange (AKE) protocols has always been a notorious hard problem. Many famous AKE protocols have been found flaws since they were finished. In this paper, we analyze two AKE protocols, which were proposed by Hassan et al. in 2007 and 2008. Then we present key compromise impersonation attack and ephemeral key compromise attack to their two AKE protocols.

authenticated key exchange key compromise impersonation attack ephemeral key compromise attack

Qingfeng Cheng Guangguo Han Chuangui Ma

Zhengzhou Information Science and Technology Institute Zhengzhou, 450002, P. R. China Institute of Mathematics, Hangzhou Dianzi University, Hangzhou, 310018, P. R. China

国际会议

The First International Conference on Multimedia Information Networking and Security(第一届国际多媒体网络信息安全会议 MINES 2009)

武汉

英文

1070-1072

2009-11-18(万方平台首次上网日期,不代表论文的发表时间)