2003
DOI: 10.1007/978-3-662-09527-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Goals for Authentication and Key Establishment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(24 citation statements)
references
References 0 publications
0
24
0
Order By: Relevance
“…Man-in-the-middle attack means that an active attacker intercepts the communication line between a legal user and the server and uses some means to successfully masquerade as both the server to the user and the user to the server [31]. From the above analysis, we know that our protocol could provide mutual authentication.…”
Section: Man-in-the-middle Attacksmentioning
confidence: 93%
See 3 more Smart Citations
“…Man-in-the-middle attack means that an active attacker intercepts the communication line between a legal user and the server and uses some means to successfully masquerade as both the server to the user and the user to the server [31]. From the above analysis, we know that our protocol could provide mutual authentication.…”
Section: Man-in-the-middle Attacksmentioning
confidence: 93%
“…In the on-line password guessing attack, the adversary tries to use guessed passwords iteratively to pass the verification of the server in an online manner. While in off-line password attack, the adversary intercepts messages exchanged between the user and the server, and then iteratively guesses the user's password and verifies whether his guess is correct or not in an off-line manner [31]. It is well known that the online password guessing attacks can be easily thwarted by limiting the number of continuous login attempts within a short period.…”
Section: Of H (K a ) Or H (K B ) Where K A = T R A (Y ) = T R A ×R Bmentioning
confidence: 99%
See 2 more Smart Citations
“…Cryptography relies upon two components, an algorithm and a key -ideally a strong algorithm and a key combination should be difficult to break. Thus the cornerstone of secure cryptosystems is key establishment which is the process by which two (or more) entities establish a shared secret key for subsequent secure communications [1]. Key establishment includes both key agreement and key transport [2].…”
Section: Introductionmentioning
confidence: 99%