Improving The Key Agreement Protocol Security Based On Hadamard Matrices
نویسندگان
چکیده
منابع مشابه
Improving the Lee-lee’s Password Based Authenticated Key Agreement Protocol
Password based authenticated key agreement protocols have been the most widely used methods for user authentication, since it allows people to choose and remember their own passwords without any assistant device. Password based authenticated key agreement protocols, however, are vulnerable to password guessing attacks since users usually choose easy-to-remember passwords. Recently, Lee and Lee ...
متن کاملOn The Security of a Group Key Agreement Protocol
Tseng [1] proposes a group key agreement protocol for use in a wireless network consisting of a number of low-power mobile nodes with limited computational and communicational resources, and a powerful wireless gateway with much greater resources. In such a wireless network, each low-power node can send messages to the powerful node via unicast communication, and the powerful node can broadcast...
متن کاملOptimized Key Agreement Protocol Based on Chaotic
—Many key agreement protocols based on chaotic maps have been proposed to guarantee secure communications in the network. Recently, Wang et al. proposed a new key agreement protocol based on chaotic maps. But some issues exist in this protocol, such as anonymity, key distribution and management, and password problems. In order to improve the performance of Wang et al.’s protocol, this paper pr...
متن کاملSecurity Analysis of the PACE Key-Agreement Protocol
We analyze the Password Authenticated Connection Establishment (PACE) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deployment in machine readable travel documents. We show that the PACE protocol is secure in the real-or-random sense of Abdalla, Fouque and Pointcheval, under a number-theoretic assumption related t...
متن کاملSecurity Issues in the Diffie-Hellman Key Agreement Protocol
Diffie-Hellman key agreement protocol [27] implementations have been plagued by serious security flaws. The attacks can be very subtle and, more often than not, haven’t been taken into account by protocol designers. In this paper we attempt to provide a link between theoretical research and real-world implementations. In addition to exposing the most important attacks and issues we present fair...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Mathematics and Computer Science
سال: 2014
ISSN: 2008-949X
DOI: 10.22436/jmcs.012.04.07