DocumentCode :
1012107
Title :
Addressing weaknesses in two cryptographic protocols of Bull, Gong and Sollins
Author :
Mathuria, A.M.
Author_Institution :
Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
Volume :
31
Issue :
18
fYear :
1995
fDate :
8/31/1995 12:00:00 AM
Firstpage :
1543
Lastpage :
1544
Abstract :
The authors demonstrate replay attacks on two authentication and key distribution protocols proposed by Bull, Gong and Sollins (1992). The observations leading to the attacks are used intuitively to arrive at more robust versions of the protocols
Keywords :
access protocols; message authentication; public key cryptography; authentication; cryptographic protocols; key distribution;
fLanguage :
English
Journal_Title :
Electronics Letters
Publisher :
iet
ISSN :
0013-5194
Type :
jour
DOI :
10.1049/el:19951089
Filename :
469183
Link To Document :
بازگشت