Recently, Tseng and Wu pointed out that the second pro-tocol of Biswas's two-party keys scheme based on the Diffe-Hellman technique has a security weakness and pro-posed a new protocol to remedy the weakness. In this article, we point out that Tseng-Wu's protocol is vulner-able to a man-in-the-middle attack. An attacker could intercept, delete, or modify the communicated messages between two communicating party or among the group members.
机构:
Department of Mathematics, College of Engineering and Technology, SRM Institute of Science and Technology, Tamilnadu, Kattankulathur,603203, IndiaDepartment of Mathematics, College of Engineering and Technology, SRM Institute of Science and Technology, Tamilnadu, Kattankulathur,603203, India
Jackson, J.
Perumal, R.
论文数: 0引用数: 0
h-index: 0
机构:
Department of Mathematics, College of Engineering and Technology, SRM Institute of Science and Technology, Tamilnadu, Kattankulathur,603203, IndiaDepartment of Mathematics, College of Engineering and Technology, SRM Institute of Science and Technology, Tamilnadu, Kattankulathur,603203, India
机构:
Computer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education
Huawei Technoligies Co., Ltd.Computer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education
Shaowu MAO
Pei ZHANG
论文数: 0引用数: 0
h-index: 0
机构:
Computer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of EducationComputer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education
Pei ZHANG
Houzhen WANG
论文数: 0引用数: 0
h-index: 0
机构:
Computer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of EducationComputer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education
Houzhen WANG
Huanguo ZHANG
论文数: 0引用数: 0
h-index: 0
机构:
Computer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of EducationComputer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education
Huanguo ZHANG
Wanqing WU
论文数: 0引用数: 0
h-index: 0
机构:
Computer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education
School of Computer Science and Technology, Hebei UniversityComputer School of Wuhan University, The Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education