...
【24h】

Impersonation Attack on EKE Protocol

机译:对EKE协议的模拟攻击

获取原文
           

摘要

The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key recovery attack was proved on ECC-3PEKE protocol using the Undetectable online password guessing attack proposed by Yoon and Yon. In the present paper an Impersonation attack on ECC-3PEKE protocol using the Undetectable online password guessing attack proposed by Yoon and Yon is demonstrated.
机译:密钥交换协议是使用会话密钥在用户对之间建立安全通信的最优雅的方法之一。密码的熵很低,因此该协议应抵抗所有类型的密码猜测攻击。 Chang和Chang最近提出了ECC-3PEKE协议。他们声称该协议是安全,高效和实用的。除非他们声明Yoon和Yoo对上述协议提出了不可检测的在线密码猜测攻击。使用Yoon和Yon提出的“不可检测的在线密码猜测”攻击,在ECC-3PEKE协议上证明了密钥恢复攻击。在本文中,演示了使用Yoon和Yon提出的使用不可检测的在线密码猜测攻击对ECC-3PEKE协议进行模拟攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号