Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506985 | Applied Mathematics and Computation | 2005 | 4 Pages |
Abstract
Recently, Harn and Lin proposed a multiple-key agreement protocol without using conventional one-way function in a two-pass interaction. Yen and Joye pointed out that their protocol had a high probability vulnerable to suffer from the forgery attack. At the same time, Yen and Joye modified Harn and Lin's protocol to resist the above attack. Later, Wu et al. found Yen and Joye's protocol also existed the same weakness and improved Yen and Joye's protocol. In 2001, Yeh et al. explained Wu et al.'s improvement was not achieved Harn and Lin's requirements and proposed an improved method. Unfortunately, in 2004, Chien and Jan pointed out that Yeh et al.'s improvement was vulnerable to the impersonation attack. For enhancing the security and key utilization, Chien and Jan proposed an improved protocol. However, in this paper, we shall point out that Chien and Jan's improvement also exists the impersonation attack.
Keywords
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Chou-Chen Yang, Ren-Chiun Wang,