Article ID Journal Published Year Pages File Type
9506534 Applied Mathematics and Computation 2005 5 Pages PDF
Abstract
Lee and Lee recently pointed out that the Hsu et al. authenticated key agreement scheme is vulnerable to the modification attack and further proposed an improvement of Hsu et al. However, this work shows that Lee and Lee scheme is vulnerable to the man-in-the-middle attack. A slight improvement to their scheme is proposed to overcome this weakness.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, ,