Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506534 | Applied Mathematics and Computation | 2005 | 5 Pages |
Abstract
Lee and Lee recently pointed out that the Hsu et al. authenticated key agreement scheme is vulnerable to the modification attack and further proposed an improvement of Hsu et al. However, this work shows that Lee and Lee scheme is vulnerable to the man-in-the-middle attack. A slight improvement to their scheme is proposed to overcome this weakness.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Keon-Jik Lee, Byeong-Jik Lee,