Location of Repository

IMPERSONATION ATTACK ON EKE PROTOCOL

By Shirisha Tallapally

Abstract

The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key recovery attack was proved on ECC-3PEKE protocol using the Undetectable online password guessing attack proposed by Yoon and Yon. In the present paper an Impersonation attack on ECC-3PEKE protocol using the Undetectable online password guessing attack proposed by Yoon and Yon is demonstrated

Topics: Undetectable online password guessing attack
Year: 2011
OAI identifier: oai:CiteSeerX.psu:10.1.1.192.2251
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://airccse.org/journal/nsa... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.