Breaking the Simple Authenticated Key Agreement (SAKA) protocol

Chris J Mitchell

(2001)

Chris J Mitchell (2001) Breaking the Simple Authenticated Key Agreement (SAKA) protocol.

Our Full Text Deposits

Full text access: Open

Full Text - 86.49 KB

Links to Copies of this Item Held Elsewhere


Abstract

An active attack against a key agreement protocol based on a shared password is described. If poorly chosen, as passwords often are, the password can be compromised by a simple brute force search.

Information about this Version

This is a Published version
This version's date is: 18/08/2001
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/6aec28e1-8e58-dd62-50d7-ecc5f6bf9eb9/1/

Item TypeMonograph (Technical Report)
TitleBreaking the Simple Authenticated Key Agreement (SAKA) protocol
AuthorsMitchell, Chris J
DepartmentsFaculty of Science\Mathematics

Deposited by () on 15-Jul-2010 in Royal Holloway Research Online.Last modified on 10-Dec-2010

Notes

References


Details