Improvement of modified authenticated key agreement protocol

Chris J. Mitchell, Hsu, C-L., Wu, T-S. and Wu, T-C.

(2002)

Chris J. Mitchell, Hsu, C-L., Wu, T-S. and Wu, T-C. (2002) Improvement of modified authenticated key agreement protocol. Applied Mathematics and Computation, 142 (2-3).

Our Full Text Deposits

Full text access: Open

Full Text - 37.1 KB

Full Text - 208.66 KB

Links to Copies of this Item Held Elsewhere


Abstract

Recently, Ku and Wang showed that Tseng’s modified authenticated key agreement protocol is vulnerable to two attacks and proposed an improvement to withstand these attacks. However, this letter will show that this improvement is still vulnerable to the modification attack, which is contrary to their claims. Additionally, we proposed an improvement to eliminate this security flaw.

Information about this Version

This is a Published version
This version's date is: 12/2002
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/6472f09e-79ef-4e8c-4eff-891bfdbce280/1/

Item TypeJournal Article
TitleImprovement of modified authenticated key agreement protocol
AuthorsMitchell, Chris
Hsu, C-L.
Wu, T-S.
Wu, T-C.
Uncontrolled Keywordsauthenticated key agreement, modification attack, cryptanalysis
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1016/S0096-3003(02)00304-1

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

This is the final draft version of the paper that appeared in 'Applied Mathematics and Computation', 142(2), November 2002.

References

1. W. Diffie and M. Hellman, New directions in cryptography. IEEE Transactions on Information Theory IT-22 6 (1976), pp. 644–654
2. D.H. Seo and P. Sweeney, Simple authenticated key agreement algorithm. Electronics Letters 35 13 (1999), pp. 1073–1074
3. Y.M. Tseng, Weakness in simple authenticated key agreement protocol. Electronics Letters 36 1 (2000), pp. 48–49
4. W.C. Ku and S.D. Wang, Cryptanalysis of modified authenticated key agreement protocol. Electronics Letters 36 21 (2000), pp. 1770–1771


Details