Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Public Wireless LANs
نویسندگان
چکیده
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.'s protocol is vulnerable to the stolen-verifier attack and does not satisfy user anonymity. Keywords—PWLANs, user privacy, smart card, authentication, key exchange
منابع مشابه
Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol
With the rapid development of communication technology, wireless technology has become more and more important, and has been widely used in personal communication. Recently, Aydos et al. proposed an ECC-based authenticated key agreement protocol for wireless communication. In their protocol, they used ECDSA and Diffie-Hellman key agreement to provide authentication and to obtain a session key f...
متن کاملCryptanalysis of Two Password-Authenticated Key Exchange Protocols
In large-scale client-client communication environments, Password-Authenticated Key Exchange (PAKE) based on trusted server is very convenient in key management. For enhancing the efficiency and preventing various attacks, Wang and Mo proposed a three-PAKE protocol, Yoon and Yoo proposed a C2C-PAKE protocol. However, in this paper, we show that the Wang-Mo protocol and the Yoon-Yoo protocol exi...
متن کاملCryptanalysis of Two-party Explicit Authenticated Key Agreement Protocol
In 2015, Zheng et al. proposed an efficient protocol for two-party explicit authenticated key agreement(2EAKA). Zheng et al. claimed that their proposed 2EAKA protocol does not need any fixed public key infrastructure and is provably secure in the random oracle under the Computation Gap Diffie-Hellman assumption. However, this paper points out that Zheng et al.’s 2EAKA protocol still suffers fr...
متن کاملAuthenticated key exchange protocol for Wireless Sensor Networks
Wireless Sensor Network (WSN) suffer from many constraints including lower processing power, low battery life and small memory. Security turns into the primary concern to manage in such sort of systems as customary Public key cryptography (PKC) algorithms are computionaly expensive and hence not feasible for WSN. As key exchange is significant in every cryptographic primitive, requirement for a...
متن کاملCryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key. Due to their significance in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings. Recently, Lo et al. proposed a three-party password-based authenticated key exchange (3PAK...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009