JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Brief Consideration on the Security of Hash-Based Authenticator
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Brief Consideration on the Security of Hash-Based Authenticator
Byun, Jin Wook;
  PDF(new window)
 Abstract
Authenticated key exchange protocol achieves its authentication by using hash-based authenticator with input of common message and session key that agrees between participants. In the letter, we show that this approach cannot satisfy the entire security, through a recent example protocol that is proposed by Tsai et al, 2014, if the input of authenticator has been insecurely designed.
 Keywords
Authenticator;Authenticated Key Exchange;Security Analysis;
 Language
Korean
 Cited by
 References
1.
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Proceedings of Eurocrypt'00, LNCS 1807, pp. 139-155, 2000.

2.
Jia-Lun Tsai, Nai-Wei Lo, and Txong-Chen Wu, "Novel Anonymous Authentication Scheme Using Smart Cards," IEEE Transaction on Industrial Informatics vol. 9 Issue 4, pp. 2004-2013, Nov. 2013. crossref(new window)