International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 20 - Issue 4 |
Published: April 2011 |
Authors: R.Padmavathy |
![]() |
R.Padmavathy . Cryptanalysis of C-3 PEKE Protocol. International Journal of Computer Applications. 20, 4 (April 2011), 22-31. DOI=10.5120/2421-3249
@article{ 10.5120/2421-3249, author = { R.Padmavathy }, title = { Cryptanalysis of C-3 PEKE Protocol }, journal = { International Journal of Computer Applications }, year = { 2011 }, volume = { 20 }, number = { 4 }, pages = { 22-31 }, doi = { 10.5120/2421-3249 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2011 %A R.Padmavathy %T Cryptanalysis of C-3 PEKE Protocol%T %J International Journal of Computer Applications %V 20 %N 4 %P 22-31 %R 10.5120/2421-3249 %I Foundation of Computer Science (FCS), NY, USA
The key exchange protocol using passwords achieved great attention due to its simplicity and efficiency. Recently, Chang proposed a practical three-party key exchange (C-3 PEKE) protocol with round efficiency. Later, Lee and Chang presented an off-line password guessing attack on C-3 PEKE protocol. In the present paper, an impersonation-of-the initiator attack and impersonation-of-the responder attack are demonstrated on C-3 PEKE protocol using the off-line password guessing attack proposed by Lee and Chang.