Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols
暂无分享,去创建一个
Abstract In 1998, Chang and Wu proposed a group-oriented authentication mechanism with key exchange [Computer Communications 21 (1998) 485–497]. The authors show that the Chang–Wu protocols are vulnerable to the impersonation attack. They also give improvements that can not only eliminate the security flaw, but also reduce the redundant messages inherent in the original protocols.
[1] Patrick Horster,et al. Undetectable on-line password guessing attacks , 1995, OPSR.
[2] Tzong-Chen Wu,et al. Group-oriented authentication mechanism with key exchange , 1998, Comput. Commun..