Comment on Xu et al.'s Key Agreement and Password Authentication Protocol

被引:0
|
作者
Guo, Yongning [2 ]
Liu, Chenglian [1 ,2 ,3 ]
机构
[1] Fujian Normal Univ, Fuqing Branch, Dept Math & Comp Sci, Fuqing 350300, Peoples R China
[2] Fujian Normal Univ, Fuqing Branch, Fuqing 350300, Peoples R China
[3] Univ London Royal Holloway, Egham TW20 0EX, Surrey, England
关键词
Key agreement and password authentication; Linear equation in two unknown of congruence; Discrete logarithm; Reflection attack;
D O I
10.4028/www.scientific.net/AMM.121-126.3847
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact mode of information flow style. Since public key conception was proposed, it had authentication function to secure while they are communication, and defense the data to leak based on stranger. In 2010, Xu et al. proposed an improvement of generalized key agreement and password authentication protocol which it based on linear equation in two unknown of congruence. In this paper, we pointed out some errors. Thus, the Xu et al.'s improved scheme may not becomes to be correction
引用
收藏
页码:3847 / +
页数:2
相关论文
共 50 条
  • [1] A steady on the generalized key agreement and password authentication protocol
    Kwon, T
    Song, J
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2000, E83B (09) : 2044 - 2050
  • [2] Comment on Xu et al. 2017
    Landry, Christopher J.
    Prodanovic, Masa
    Eichhubl, Peter
    [J]. AICHE JOURNAL, 2017, 63 (10) : 4717 - 4718
  • [3] Comment on Xu et al. (2023)
    Topkan, Erkan
    [J]. ORAL DISEASES, 2024, 30 (05) : 3540 - 3541
  • [4] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [5] An improvement on Yang et al.'s password authentication schemes
    Kim, KW
    Jeon, JC
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 207 - 215
  • [6] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [7] Security analysis of the generalized key agreement and password authentication protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    [J]. IEEE COMMUNICATIONS LETTERS, 2001, 5 (11) : 462 - 463
  • [8] Reflection attack on a generalized key agreement and password authentication protocol
    Ku, WC
    Lee, HL
    Chen, CM
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (05) : 1386 - 1388
  • [9] Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
    Jiang, Qi
    Ma, Jianfeng
    Tian, Youliang
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (07) : 1340 - 1351
  • [10] Cryptanalysis and the improvement of Kim et al.'s password authentication schemes
    Giri, Debasis
    Srivastava, P. D.
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 156 - 166