DocumentCode
1012107
Title
Addressing weaknesses in two cryptographic protocols of Bull, Gong and Sollins
Author
Mathuria, A.M.
Author_Institution
Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
Volume
31
Issue
18
fYear
1995
fDate
8/31/1995 12:00:00 AM
Firstpage
1543
Lastpage
1544
Abstract
The authors demonstrate replay attacks on two authentication and key distribution protocols proposed by Bull, Gong and Sollins (1992). The observations leading to the attacks are used intuitively to arrive at more robust versions of the protocols
Keywords
access protocols; message authentication; public key cryptography; authentication; cryptographic protocols; key distribution;
fLanguage
English
Journal_Title
Electronics Letters
Publisher
iet
ISSN
0013-5194
Type
jour
DOI
10.1049/el:19951089
Filename
469183
Link To Document