|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 20 - Issue 4 |
| Published: April 2011 |
| Authors: R.Padmavathy |
10.5120/2421-3249
|
R.Padmavathy . Cryptanalysis of C-3 PEKE Protocol. International Journal of Computer Applications. 20, 4 (April 2011), 22-31. DOI=10.5120/2421-3249
@article{ 10.5120/2421-3249,
author = { R.Padmavathy },
title = { Cryptanalysis of C-3 PEKE Protocol },
journal = { International Journal of Computer Applications },
year = { 2011 },
volume = { 20 },
number = { 4 },
pages = { 22-31 },
doi = { 10.5120/2421-3249 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2011
%A R.Padmavathy
%T Cryptanalysis of C-3 PEKE Protocol%T
%J International Journal of Computer Applications
%V 20
%N 4
%P 22-31
%R 10.5120/2421-3249
%I Foundation of Computer Science (FCS), NY, USA
The key exchange protocol using passwords achieved great attention due to its simplicity and efficiency. Recently, Chang proposed a practical three-party key exchange (C-3 PEKE) protocol with round efficiency. Later, Lee and Chang presented an off-line password guessing attack on C-3 PEKE protocol. In the present paper, an impersonation-of-the initiator attack and impersonation-of-the responder attack are demonstrated on C-3 PEKE protocol using the off-line password guessing attack proposed by Lee and Chang.