Chao-Wen Chan, Shao-Fan Tseng, and Iuon-Chang Lin
Man-in-the-middle attack, Off-line attack, Oracle, Three-party key exchange
In the presented article, we cryptanalyze a three-party authenticated key exchange scheme proposed by Lv et al. in 2012. We propose two attacks to the scheme. One is an off-line attack and another is a man-in-the-middle attack. We also analyze these two attacks in the article.
Important Links:
Go Back