An internet key exchange protocol based on public key infrastructure
β Scribed by Jian-ming Zhu; Jian-feng Ma
- Publisher
- Chinese Electronic Periodical Services
- Year
- 2004
- Tongue
- English
- Weight
- 496 KB
- Volume
- 8
- Category
- Article
- ISSN
- 1007-6417
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Cryptography based on chaos theory has developed fast in the past few years, but most of the researches focus on secret key cryptography. There are few public key encryption algorithms and cryptographic protocols based on chaos, which are also of great importance for network security. We introduce a
Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate
Recently, Tseng et al. proposed a novel key agreement protocol based on chaotic maps. They claimed that the protocol achieved session key agreement between a server and a user, and allowed the user to anonymously interact with the server. This paper, however, will demonstrate that Tseng et al.'s pro