Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
454412 | Computer Standards & Interfaces | 2007 | 4 Pages |
Abstract
In this paper we point out potential weaknesses of AuthA protocols which are in the process of being standardized by IEEE; IEEE P1363-Password-based authentication and key agreement protocols. More precisely, we present chosen protocol attacks on AuthA password-authenticated key agreement protocols. We make suggestions for improvement.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Kyung-Ah Shim,