Thumbnail
Access Restriction
Subscribed

Author Wu, Chien-Nan ♦ Lee, Narn-Yih
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Authentication ♦ Key exchange ♦ Cryptography ♦ Security ♦ Modification attack
Abstract Recently, Hwang, Shiau and Lai proposed an efficient authentication key exchange protocol to decrease the computation cost of the Harn-Lin improved protocol. However, the Hawang-Shiau-Lai protocol cannot withstand the modification attack. Therefore, this paper will propose an improved protocol to enhance the security of the Hwang-Shiau-Lai protocol. The improved protocol is able to defeat the modification attack and is as efficient as the Hwang-Shiau-Lai protocol. Moreover, the improved protocol also provides the perfect forward secrecy.
Description Affiliation: Southern Taiwan University of Technology, Tainan County, Taiwan, R.O.C (Lee, Narn-Yih; Wu, Chien-Nan)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 1975-04-01
Publisher Place New York
Journal ACM SIGOPS Operating Systems Review (OPSR)
Volume Number 38
Issue Number 2
Page Count 8
Starting Page 85
Ending Page 92


Open content in new tab

   Open content in new tab
Source: ACM Digital Library