A note on leakage-resilient authenticated key exchange

Ji Young Chun, Jung Yeon Hwang, Dong Hoon Lee

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly.

Original languageEnglish
Pages (from-to)2274-2279
Number of pages6
JournalIEEE Transactions on Wireless Communications
Volume8
Issue number5
DOIs
Publication statusPublished - 2009 May

Keywords

  • Authentication
  • E-residue attack
  • Key exchange
  • Leakage-resilience
  • Off-line dictionary attack
  • Password

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'A note on leakage-resilient authenticated key exchange'. Together they form a unique fingerprint.

Cite this