Potential weaknesses of AuthA password-authenticated key agreement protocols

@article{Shim2007PotentialWO,
  title={Potential weaknesses of AuthA password-authenticated key agreement protocols},
  author={Kyung-Ah Shim},
  journal={Computer Standards & Interfaces},
  year={2007},
  volume={29},
  pages={580-583}
}
In this paper we point out potential weaknesses of AuthA protocols which are in the process of being standardized by IEEE; IEEE P1363-Password-based authentication and key agreement protocols. More precisely, we present chosen protocol attacks on AuthA password-authenticated key agreement protocols. We make suggestions for improvement. 

Similar Papers

Citations

Publications citing this paper.

Improving the Shim's AuthA Password-Authenticated Key Agreement Protocol

  • 2008 3rd International Conference on Innovative Computing Information and Control
  • 2008
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 13 REFERENCES