Chris J. Mitchell, Hsu, C-L., Wu, T-S. and Wu, T-C. (2002) Improvement of modified authenticated key agreement protocol. Applied Mathematics and Computation, 142 (2-3).
Full text access: Open
Recently, Ku and Wang showed that Tseng’s modified authenticated key agreement protocol is vulnerable to two attacks and proposed an improvement to withstand these attacks. However, this letter will show that this improvement is still vulnerable to the modification attack, which is contrary to their claims. Additionally, we proposed an improvement to eliminate this security flaw.
This is a Published version This version's date is: 12/2002 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/6472f09e-79ef-4e8c-4eff-891bfdbce280/2/
Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012
This is the final draft version of the paper that appeared in 'Applied Mathematics and Computation', 142(2), November 2002.
1. W. Diffie and M. Hellman, New directions in cryptography. IEEE Transactions on Information Theory IT-22 6 (1976), pp. 644â654 2. D.H. Seo and P. Sweeney, Simple authenticated key agreement algorithm. Electronics Letters 35 13 (1999), pp. 1073â1074 3. Y.M. Tseng, Weakness in simple authenticated key agreement protocol. Electronics Letters 36 1 (2000), pp. 48â49 4. W.C. Ku and S.D. Wang, Cryptanalysis of modified authenticated key agreement protocol. Electronics Letters 36 21 (2000), pp. 1770â1771