Title :
Addressing weaknesses in two cryptographic protocols of Bull, Gong and Sollins
Author_Institution :
Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
fDate :
8/31/1995 12:00:00 AM
Abstract :
The authors demonstrate replay attacks on two authentication and key distribution protocols proposed by Bull, Gong and Sollins (1992). The observations leading to the attacks are used intuitively to arrive at more robust versions of the protocols
Keywords :
access protocols; message authentication; public key cryptography; authentication; cryptographic protocols; key distribution;
Journal_Title :
Electronics Letters
DOI :
10.1049/el:19951089