Improving The Key Agreement Protocol Security Based On Hadamard Matrices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving the Lee-lee’s Password Based Authenticated Key Agreement Protocol

Password based authenticated key agreement protocols have been the most widely used methods for user authentication, since it allows people to choose and remember their own passwords without any assistant device. Password based authenticated key agreement protocols, however, are vulnerable to password guessing attacks since users usually choose easy-to-remember passwords. Recently, Lee and Lee ...

متن کامل

On The Security of a Group Key Agreement Protocol

Tseng [1] proposes a group key agreement protocol for use in a wireless network consisting of a number of low-power mobile nodes with limited computational and communicational resources, and a powerful wireless gateway with much greater resources. In such a wireless network, each low-power node can send messages to the powerful node via unicast communication, and the powerful node can broadcast...

متن کامل

Optimized Key Agreement Protocol Based on Chaotic

—Many key agreement protocols based on chaotic maps have been proposed to guarantee secure communications in the network. Recently, Wang et al. proposed a new key agreement protocol based on chaotic maps. But some issues exist in this protocol, such as anonymity, key distribution and management, and password problems. In order to improve the performance of Wang et al.’s protocol, this paper pr...

متن کامل

Security Analysis of the PACE Key-Agreement Protocol

We analyze the Password Authenticated Connection Establishment (PACE) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deployment in machine readable travel documents. We show that the PACE protocol is secure in the real-or-random sense of Abdalla, Fouque and Pointcheval, under a number-theoretic assumption related t...

متن کامل

Security Issues in the Diffie-Hellman Key Agreement Protocol

Diffie-Hellman key agreement protocol [27] implementations have been plagued by serious security flaws. The attacks can be very subtle and, more often than not, haven’t been taken into account by protocol designers. In this paper we attempt to provide a link between theoretical research and real-world implementations. In addition to exposing the most important attacks and issues we present fair...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Mathematics and Computer Science

سال: 2014

ISSN: 2008-949X

DOI: 10.22436/jmcs.012.04.07