2009
DOI: 10.1007/978-3-642-02457-3_18
|View full text |Cite
|
Sign up to set email alerts
|

Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…The Initial Phase of the Kim-Jo-Kim-Won Protocol [39] can be expressed in the language of the logic as follows: Applying the Attack Detection Logic reveals the following weaknesses:  Rule R2.2 is activated twice, as H(g,NU) and H(H(g,NU),KUTTP) from S1 are symmetric in opposite direction to H(g,NS) and H(H(g,NS),KSTTP) from S2. Also, R4.1 is activated twice, as {H(g,NU) ,H(g,NS), n,H(NTTP)}KUTTP and {H(g,NU), H(g,NS)}H(H(g,NU), H(g,NS)) from S4 are not strong sender bound.…”
Section: Kjkw Protocol -Initial Phasementioning
confidence: 99%
“…The Initial Phase of the Kim-Jo-Kim-Won Protocol [39] can be expressed in the language of the logic as follows: Applying the Attack Detection Logic reveals the following weaknesses:  Rule R2.2 is activated twice, as H(g,NU) and H(H(g,NU),KUTTP) from S1 are symmetric in opposite direction to H(g,NS) and H(H(g,NS),KSTTP) from S2. Also, R4.1 is activated twice, as {H(g,NU) ,H(g,NS), n,H(NTTP)}KUTTP and {H(g,NU), H(g,NS)}H(H(g,NU), H(g,NS)) from S4 are not strong sender bound.…”
Section: Kjkw Protocol -Initial Phasementioning
confidence: 99%
“…The authors in Ref. 15 have claimed that the protocol in Ref. 14 is insecure in the presence of an active adversary.…”
Section: Introductionmentioning
confidence: 99%
“…The major contributions made in this paper are summarized as follows: We analyse three types of possible attacks of off‐line guessing attacks , known key attacks and man‐in‐the‐middle attacks in the wireless networks and investigate the vulnerabilities of existing protocol under these three attacks. We propose a solution to prevent these attacks and to enhance the proposal in Ref. 15. We analyse the attacks of off‐line guessing by a formal model.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations