Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.3.609

A Brief Consideration on the Security of Hash-Based Authenticator  

Byun, Jin Wook (Pyeongtaek University, Department of Information and Communication)
Abstract
Authenticated key exchange protocol achieves its authentication by using hash-based authenticator with input of common message and session key that agrees between participants. In the letter, we show that this approach cannot satisfy the entire security, through a recent example protocol that is proposed by Tsai et al, 2014, if the input of authenticator has been insecurely designed.
Keywords
Authenticator; Authenticated Key Exchange; Security Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Proceedings of Eurocrypt'00, LNCS 1807, pp. 139-155, 2000.
2 Jia-Lun Tsai, Nai-Wei Lo, and Txong-Chen Wu, "Novel Anonymous Authentication Scheme Using Smart Cards," IEEE Transaction on Industrial Informatics vol. 9 Issue 4, pp. 2004-2013, Nov. 2013.   DOI