Advance improvement on the simple authentication key agreement protocol

被引:0
|
作者
Deng, Chao [1 ]
Deng, Shaoyi [1 ]
机构
[1] Henan Polytech Univ, Inst Comp Sci & Technol, Jiaozuo, Peoples R China
关键词
Key agreement; Middleperson attack; Key exchange; Authenticated; REMOTE USER AUTHENTICATION; SCHEME;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Yang et al. proposed a cryptanalysis of simple authenticated key agreement protocols that they broke the SAKA-related scheme in 2004. We improved a new scheme which it based on the Tseng's scheme, and it would withstand previous attack such as the modification attack and the dictionary attack.
引用
收藏
页码:495 / 497
页数:3
相关论文
共 50 条
  • [31] A New Mutual Authentication and Key Agreement Protocol for Mobile Communications
    Zhang, Juan
    Chen, Guang-hui
    Deng, Fang-min
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9096 - +
  • [32] Security analysis of an authentication and key agreement protocol for satellite communications
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 4300 - 4306
  • [33] Cross-domain authentication and the key agreement protocol in VANETs
    Li X.
    Yang D.
    Zheng X.
    Zhu X.
    Chen B.
    Zhang Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 141 - 148
  • [34] A Novel Certificateless Authentication and Key Agreement Protocol for Smart Grid
    Liu, Zewei
    Hu, Chunqiang
    Ruan, Conghao
    Li, Ruinian
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3288 - 3293
  • [35] Adaptive protocol for entity authentication and key agreement in mobile networks
    Zhang, MX
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 166 - 183
  • [36] An improved Authentication and Key Agreement Protocol of 3G
    Zheng, Xiankun
    Liu, Changjiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 733 - 737
  • [37] Certificateless Handover Authentication and Key Agreement Protocol for Network Slicing
    Wu X.
    Ji W.
    Weng J.
    Li Y.
    Shen X.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (04): : 103 - 108
  • [38] AN AUTHENTICATION AND SESSION KEY AGREEMENT PROTOCOL BASED ON IDENTITY SIGNATURE
    Li, Ning
    Yeap, Tet
    Yu, Chongxiu
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 311 - +
  • [39] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Alizadeh, Javad
    Safkhani, Masoumeh
    Allahdadi, Amir
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 2911 - 2935
  • [40] A Beyond-5G Authentication and Key Agreement Protocol
    Damir, Mohamed Taoufiq
    Meskanen, Tommi
    Ramezanian, Sara
    Niemi, Valtteri
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 249 - 264