• DocumentCode
    1012107
  • Title

    Addressing weaknesses in two cryptographic protocols of Bull, Gong and Sollins

  • Author

    Mathuria, A.M.

  • Author_Institution
    Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
  • Volume
    31
  • Issue
    18
  • fYear
    1995
  • fDate
    8/31/1995 12:00:00 AM
  • Firstpage
    1543
  • Lastpage
    1544
  • Abstract
    The authors demonstrate replay attacks on two authentication and key distribution protocols proposed by Bull, Gong and Sollins (1992). The observations leading to the attacks are used intuitively to arrive at more robust versions of the protocols
  • Keywords
    access protocols; message authentication; public key cryptography; authentication; cryptographic protocols; key distribution;
  • fLanguage
    English
  • Journal_Title
    Electronics Letters
  • Publisher
    iet
  • ISSN
    0013-5194
  • Type

    jour

  • DOI
    10.1049/el:19951089
  • Filename
    469183