NL repository
menu
검색
Library
Browse
Communities & Collections
By Date
Authors
Titles
Subject
My Repository
My Account
Receive email updates
Edit Profile
DSpace at EWHA
자연과학대학
수학전공
Journal papers
View : 570 Download: 0
Impersonation attacks on key agreement protocols resistant to denial of service attacks
Title
Impersonation attacks on key agreement protocols resistant to denial of service attacks
Authors
Shim K.-A.
Ewha Authors
심경아
Issue Date
2006
Journal Title
IEICE Transactions on Information and Systems
ISSN
0916-8532
Citation
IEICE Transactions on Information and Systems vol. E89-D, no. 7, pp. 2306 - 2309
Indexed
SCIE; SCOPUS
Document Type
Conference Paper
Abstract
Hirose and Yoshida proposed an authenticated key agreement protocol based on the intractability of the Computational Diffie-Hellman problem. Recently, Hirose and Matsuura pointed out that Hirose and Yoshida's protocol is vulnerable to Denial-of-Service (DoS) attacks. And they proposed two key agreement protocols which are resistant to the DoS attacks. Their protocols are the first authenticated key agreement protocols resistant to both the storage exhaustion attack and the CPU exhaustion attack. In this paper we show that Hirose and Matsuura's DoS-resistant key agreement protocols and Hirose and Yoshida's key agreement protocol are vulnerable to impersonation attacks. We make suggestions for improvements. Copyright © 2006 The Institute of Electronics, Information and Communication Engineers.
DOI
10.1093/ietisy/e89-d.7.2306
Appears in Collections:
자연과학대학
>
수학전공
>
Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML
Show full item record
Find@EWHA
트윗하기
BROWSE
Communities & Collections
By Date
Authors
Titles
Subject