scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
01 Jan 2014
TL;DR: An attack algorithm is presented that can be employed to mount a number of attacks on the protocol under investigation and an improved version of the Bringer et al. protocol is proposed that combats the presented attacks.
Abstract: Biometric authentication establishes the identity of an individual based on biometric templates (i.e. fingerprints, retina scans etc.). Although biometric authentication has important advantages and many applications, it also raises serious security and privacy concerns. In this parer, we investigate a privacy-preserving biometric authentication protocol that has been proposed by Bringer et al. and adopts a distributed architecture (i.e. multiple entities are involved in the authentication process). We present an attack algorithm that can be employed to mount a number of attacks on the protocol under investigation and propose an improved version of the Bringer et al. protocol that combats the presented attacks.

1 citations

Journal ArticleDOI
TL;DR: Security analysis and performance analysis show the proposed 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly.
Abstract: Three-party authenticated key agreement (3PAKA) protocol is an important cryptographic mechanism for secure communication, which allows two clients to generate a shared session key with the help of the server. Recently, Tan proposed a communication and computation-efficient 3PAKA protocol. Compared with related protocols, Tan’s protocol requires fewer rounds, lower communication cost and smaller computation cost. Tan claimed that his protocol was secure against various attacks. Unfortunately, we found that his protocol cannot withstand the key compromise impersonation attack. To improve security, we proposed a new 3PAKA protocol. Security analysis and performance analysis show our 3PAKA protocol could overcome weakness in Tan’s protocol at the cost of increasing the computational cost slightly.

1 citations

Book ChapterDOI
26 Mar 2010
TL;DR: It is proved that the STPKE protocol is vulnerable to Undetectable on-line password guessing at- tacks, and suggested an enhanced protocol (STPKE' protocol).
Abstract: Three-party authenticated key exchange protocol is an important cryp- tographic technique in the secure communication areas, by which two clients, each shares a human-memorable password with a trusted server, can agree a se- cure session key. Recently, Lu and Cao proposed a simple three party password- based key exchange protocol (STPKE protocol). They claimed that their protocol is secure, efficient and practical. Unlike their claims, Kim & Choi proved that the STPKE protocol is vulnerable to Undetectable on-line password guessing at- tacks, and suggested an enhanced protocol (STPKE' protocol). In this paper, an Unknown key share attack on STPKE' protocol is demonstrated. The attack is implemented using a comprehensive set of experiments and reported. Addition- ally, the countermeasures to resist the above attack are discussed.

1 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795