2008
DOI: 10.1016/j.cose.2008.03.001
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of simple three-party key exchange protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
45
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(45 citation statements)
references
References 14 publications
0
45
0
Order By: Relevance
“…By security analysis, Huang claimed that the proposed HS-3PAKE protocol to be not only secure against various attacks, but also more efficient than the previously proposed 3PAKE protocols. However, this paper demonstrates that HS-3PAKE protocol is vulnerable to undetectable online password guessing attacks [9,10,15,16] and off-line password guessing attacks by any other user [11,14].…”
Section: Introductionmentioning
confidence: 94%
“…By security analysis, Huang claimed that the proposed HS-3PAKE protocol to be not only secure against various attacks, but also more efficient than the previously proposed 3PAKE protocols. However, this paper demonstrates that HS-3PAKE protocol is vulnerable to undetectable online password guessing attacks [9,10,15,16] and off-line password guessing attacks by any other user [11,14].…”
Section: Introductionmentioning
confidence: 94%
“…We make no idealizing assumptions in our security proof. Similar to the protocols of [2,11,12,19,24], our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol. If the underlying two-party protocol is round-optimal [45][46][47], then our three-party protocol runs in only two communication rounds.…”
Section: Protocolmentioning
confidence: 99%
“…Many of these protocols have never been proven secure in any model [3,13,[17][18][19][20][21] and/or have been found to be vulnerable to some attack(s) [2,3,5,6,8,[18][19][20]23,[26][27][28][29][30][31][32]. Some protocols [2,11,12,15,23,24] have been proven secure only in a restricted model, in which the adversary is not allowed to corrupt protocol participants, and thus, no attacks by malicious clients can be captured.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It helps in maintaining a secure link by using a common session key for specific communication. Schemes [5][6][7] discuss secure session key establishment between participants but later [8][9][10] identified that these plans are vulnerable to man-in-the-middle attack and undetectable online and offline dictionary attacks for guessing passwords. ECC-based schemes are also explored to evaluate the applicability of efficient solutions with desired security strengths using small key sizes as compared to preliminaries.…”
Section: Introductionmentioning
confidence: 99%