Title :
A Hase-based SAKA Protocol Algorithm
Author :
Lin Yipin ; Wang Xiaofeng
Author_Institution :
Coll. of Math. & Comput. Sci., Shenzhen Univ., Shenzhen, China
Abstract :
It was pointed out that the simple authenticated key agreement (SAKA) protocol suffered three weaknesses. Several improved protocols, such as improved Lin protocol, E-SAKA protocol, then were proposed as claimed being free of these three weaknesses. After reviewing of these protocols, proofs are given that these protocols still suffer from the password guessing attack. Besides, the weakness that the attacker on the E-SAKA protocol can get the session key also is pointed out. By introducing hash function a new protocol based on improved Lin´s protocol is proposed, which is free of the three weaknesses and also can prevent man-in-the-middle attack as well as the password guessing attack.
Keywords :
cryptography; protocols; SAKA protocol; hash function; man-in-the-middle attack; password guessing attack; simple authenticated key agreement; Computational intelligence; Equations; Protocols; Security; Sun;
Conference_Titel :
Computational Intelligence and Security, 2009. CIS '09. International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-5411-2
DOI :
10.1109/CIS.2009.280