Chris J Mitchell (2001) Breaking the Simple Authenticated Key Agreement (SAKA) protocol.
Full text access: Open
An active attack against a key agreement protocol based on a shared password is described. If poorly chosen, as passwords often are, the password can be compromised by a simple brute force search.
This is a Published version This version's date is: 18/08/2001 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/6aec28e1-8e58-dd62-50d7-ecc5f6bf9eb9/1/
Deposited by () on 15-Jul-2010 in Royal Holloway Research Online.Last modified on 10-Dec-2010