View : 558 Download: 0

Security analysis of authenticated key exchange protocol based on the q-th root problem

Title
Security analysis of authenticated key exchange protocol based on the q-th root problem
Authors
Shim K.-A.
Ewha Authors
심경아
Issue Date
2007
Journal Title
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
ISSN
0916-8508JCR Link
Citation
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences vol. E90-A, no. 1, pp. 231 - 233
Indexed
SCOPUS WOS scopus
Document Type
Conference Paper
Abstract
Johnston and Gemmell proposed an authenticated key exchange protocol based on the difficulty of the q-th root problem. They showed that it is provably secure against man-in-the-middle attacks. In this paper we show that the protocol is insecure against an unknown key-share attack and does not achieve forward secrecy. © 2007 The Institute of Electronics, Information and Communication Engineers.
DOI
10.1093/ietfec/e90-a.1.231
Appears in Collections:
자연과학대학 > 수학전공 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE