@inproceedings{73b8a6b2f8564cae9c8adc96a26d1c17,
title = "Security weakness in a provable secure authentication protocol given forward secure session key",
abstract = "Shi, Jang and Yoo recently proposed a provable secure key distribution and authentication protocol between user, service provider and key distribution center(KDC). The protocol was based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. Despite the claim of provable security, the protocol is in fact insecure in the presence of an active adversary. In this paper, we present the imperfection of Shi et al.'s protocol and suggest modifications to the protocol which would resolve the problem.",
keywords = "Authentication, Cryptography, Key distribution, Known key attack, Provable security",
author = "Mijin Kim and Heasuk Jo and Seungjoo Kim and Dongho Won",
year = "2009",
doi = "10.1007/978-3-642-02457-3_18",
language = "English",
isbn = "3642024564",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
number = "PART 2",
pages = "204--211",
booktitle = "Computational Science and Its Applications - ICCSA 2009 - International Conference, Proceedings",
edition = "PART 2",
note = "International Conference on Computational Science and Its Applications, ICCSA 2009 ; Conference date: 29-06-2009 Through 02-07-2009",
}