scispace - formally typeset
Search or ask a question
Author

A.M. Mathuria

Bio: A.M. Mathuria is an academic researcher from University of Wollongong. The author has contributed to research in topics: Hash-based message authentication code & Replay attack. The author has an hindex of 1, co-authored 1 publications receiving 4 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The authors demonstrate replay attacks on two authentication and key distribution protocols proposed by Bull, Gong and Sollins (1992) and use the observations leading to the attacks to arrive at more robust versions of the protocols.
Abstract: The authors demonstrate replay attacks on two authentication and key distribution protocols proposed by Bull, Gong and Sollins (1992). The observations leading to the attacks are used intuitively to arrive at more robust versions of the protocols.

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An attack on a recursive authentication protocol proposed by John Bull of APM that fails to be secure in this sense provides an object lesson on how careful one has to be in interpreting the results of a formal analysis.

136 citations

Journal ArticleDOI
01 Mar 1997
TL;DR: Alternative protocols are devised that cannot only be shown to be secure, but also are simple and elegant when compared with the existing protocols.
Abstract: Several existing one-way function based key exchange protocols are methodically analysed. The analyses provide valuable insight into the working of the protocols and reveal security weaknesses in some of the protocols. Alternative protocols are devised that cannot only be shown to be secure, but also are simple and elegant when compared with the existing protocols.

10 citations

Proceedings ArticleDOI
21 Jan 1998
TL;DR: The SKOWHF-based secure trunks and secure channels are introduced; two rules for KEP construction, KER1 and KER2, are described; and a hierarchical KEP for large scale networks is proposed.
Abstract: As key establishment protocols (KEP) are usually the initial step for setting up a secure network-based service, they are very important in enabling the required security. Most of the existing KEPs make use of cryptographic algorithms, either secret key or public-key cryptography. However, it is also possible to employ secure keyed one-way hash functions (SKOWHF) in KEP designs. Though several works have been published in this area, they only focus on the small scale networks. In this paper, we first introduce the SKOWHF-based secure trunks and secure channels; then, two rules for KEP construction, KER1 and KER2, are described. Finally, a hierarchical KEP for large scale networks is proposed.